WO2017165909A1 - Information system for item verification - Google Patents

Information system for item verification Download PDF

Info

Publication number
WO2017165909A1
WO2017165909A1 PCT/AU2017/000078 AU2017000078W WO2017165909A1 WO 2017165909 A1 WO2017165909 A1 WO 2017165909A1 AU 2017000078 W AU2017000078 W AU 2017000078W WO 2017165909 A1 WO2017165909 A1 WO 2017165909A1
Authority
WO
WIPO (PCT)
Prior art keywords
item
identifier
chain
originator
blockchain
Prior art date
Application number
PCT/AU2017/000078
Other languages
French (fr)
Inventor
Mark TOOHEY
Alex Taylor
Jason Williams
Original Assignee
Tbsx3 Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2016901208A external-priority patent/AU2016901208A0/en
Priority to AU2017239933A priority Critical patent/AU2017239933A1/en
Priority to EP17772867.2A priority patent/EP3437062B1/en
Priority to CN201780033661.6A priority patent/CN109478305A/en
Priority to US16/089,995 priority patent/US11367039B2/en
Priority to ES17772867T priority patent/ES2956770T3/en
Application filed by Tbsx3 Pty Ltd filed Critical Tbsx3 Pty Ltd
Publication of WO2017165909A1 publication Critical patent/WO2017165909A1/en
Priority to AU2020202384A priority patent/AU2020202384A1/en
Priority to AU2022203457A priority patent/AU2022203457A1/en
Priority to US17/844,711 priority patent/US11900308B2/en
Priority to US17/895,593 priority patent/US20230120636A1/en
Priority to US18/438,606 priority patent/US20240265336A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • G06Q10/0833Tracking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • G06K19/07758Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card arrangements for adhering the record carrier to further objects or living beings, functioning as an identification tag
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/35Services specially adapted for particular environments, situations or purposes for the management of goods or merchandise

Definitions

  • the present invention relates to an information system for item
  • the system is applicable to individual items and also to items grouped together.
  • Some embodiments of the present invention make use of a distributed ledger to verify the provenance and authenticity of an item ("System"). It outlines how custody of a particular item may pass between any number of custodians before reaching a potential customer.
  • the System allows that customer to verify the authenticity of the item and check its provenance through accessing a distributed ledger.
  • Tracking items of stock has been used for the purposes of inventory management and to inform any person further down the supply chain where their order is in the supply chain and hence provide an estimate on arrival. Tracking stock has also been used to identify the final location of specific items in case a recall may be necessary.
  • Radio frequency identification tags being one such method that allows easy scanning of the tag so that information can be read from the tag and sent directly to a database or other management system.
  • Cluster IDs allow each tag ID to be linked in the computer system to a cluster ID of the specific holding means for example a pallet in which a particular item of stock has been packed (US6496806B1 ). As a result the location of a particular item of stock may be tracked by the cluster in which it has been packed. Thus, at each new location the external of the holding means may be scanned rather than needing to unpack the holding means.
  • the method further includes associating a sub element with
  • the database is in the form of a blockchain structure.
  • the database is in the form of a distributed database
  • the sub-element contains customization data.
  • the customization data includes a custodian identifier
  • the method comprises multiple, successive aggregation steps, followed by multiple de-aggregation steps,
  • the method comprises multiple, successive aggregation steps, defining multiple successive aggregation records, followed by multiple de-aggregation steps, made with reference to the aggregation records.
  • the steps in the chain include spending, allocating,
  • the method further includes the step of reading and
  • the method further includes the step of amending the sub element at the time of each event.
  • the method further includes the step of amending which occurs during a step of spending.
  • the method further includes a checking step which involves checking that each identifier is identified only once at each step/event in the chain.
  • the method further includes the step of raising an alarm condition if identifier is identified more than once or if an identifier does not exist in the database.
  • an alarm condition is excluded if the sub element data is changed as part of an event.
  • the sub element includes the address of a holder [0025] In a preferred form the sub element includes rules created by the
  • the sub element includes rules created by the originator.
  • a method of verification of an aspect of an item comprising of ascribing a unique identifier to the item in respect of that aspect; storing the unique identifier in a table referenced against the item on a server; causing transmission of the item from a first location to a second location; a user accessing by reference to the item itself the unique identifier ascribed to the item; causing a comparison of the unique identifier thus obtained with the unique identifier stored on the server referenced against the item whereby the aspect of the item is verified if the unique identifier thus obtained matches with the unique identifier stored on the server referenced against the item.
  • the aspect comprises the origin of the item.
  • the aspect comprises the sponsorship or approval of the item.
  • the aspect comprises the originator of the item.
  • the table is maintained in a blockchain structure maintained by and accessible across a multiplicity of servers.
  • a computer readable medium storing a computer program in as
  • a system of verification of an aspect of an item comprising a processor which ascribes a unique identifier to the item in respect of that aspect; the processor storing the unique identifier in a table in memory referenced against the item on a server; causing transmission of the item from a first location to a second location by use of a communications system; a user accessing by use of a digital device and by reference to the item itself the unique identifier ascribed to the item; the digital device and the processor causing a comparison of the unique identifier thus obtained with the unique identifier stored on the server referenced against the item whereby the aspect of the item is verified if the unique identifier thus obtained matches
  • the aspect comprises the origin of the item.
  • the aspect comprises the sponsorship or approval of the item.
  • the aspect comprises the origin of the item.
  • the aspect comprises the sponsorship or approval of the item.
  • the aspect comprises the originator of the item.
  • the table is maintained in a blockchain structure maintained by and accessible across a multiplicity of servers.
  • the table is maintained in a blockchain structure maintained by and accessible across a multiplicity of servers.
  • Figure 1A illustrates in block diagram form packing steps in
  • Figure 1 B illustrates an end to end process in accordance with
  • embodiments of the invention from packing steps through transfer steps to unpacking steps.
  • Figure 1 C illustrates in detail the application of element identifiers and sub elements during packing steps of the process of figure 1 B
  • figure 2 illustrates an example of an unpacking and verification process
  • figure 3 illustrates a scanning step utilising a digital device
  • figure 4 illustrates a package condition process
  • figure 5 illustrates a location reporting process
  • figure 6 illustrates an identification of an anomaly in the form of an
  • Figure 7 illustrates a further example of the system applied at the
  • Figure 8 illustrates a further embodiment of the system applied at the granular level and incorporating a timeout facility.
  • Figure 9 illustrates a further exemplary embodiment of the system of the present invention
  • Figure 10 illustrates yet a further exemplary embodiment of the system of the present invention applied in the context of selective data retention and selective data availability.
  • Figure 11 is an diagram of an exemplary block chain data structure
  • Figure 12 illustrates diagrammatically use of the block chain data
  • Embodiments of the present invention relate to a system
  • embodiments of the system are capable of allowing multiple levels of packing assigning tags to each new packaging level.
  • the item of stock is a single package with a Tag ID, this is then packed in a carton which is given a carton ID, the pallets are then packed into a pallet which is given a pallet ID, and the pallets are packed into a container which is given a container ID.
  • To move stock in a packed or unpacked form it is necessary to assign a custodian.
  • the custodial chain starts when the manufacturer hands custody to the first custodian who in turn passes custody along the supply chain.
  • Custodians may be freight
  • This database needs to be shared by all users and each user allowed to update the database in accordance with their position.
  • the database may be implemented by a Blockchain structure as a distributed database system intended to maintain a complete record and be secure against alteration.
  • RO/AU each action as a transaction recording this in a database that follows a blockchain structure. Each action is a transaction recorded permanently.
  • Each user be it the manufacturer, a supply chain participant, wholesaler, or a store, may (but is not required) to keep a copy of the database following the distributed ledger feature of blockchain.
  • the reason to use a distributed ledger when tracking items of stock is to allow a validation of the path that any particular item has followed and to minimise the risk of tampering (or identify it with a faulty record) anywhere along the chain. Any alteration of the blockchain will result in an error message and the stock affected by the identified alteration can be removed from circulation for inspection.
  • stock using the blockchain structure means that a customer can trace back the movement of any item of stock and so have confidence that non-genuine items are not being sold or resold.
  • the relevant data 14 is recognised and interrogated by digital devices during the various steps.
  • the digital devices take the form of smartphones or tablets16.
  • Figure 1 C illustrates in detail one example of a packing step 11.
  • an element 17 will have associated physically with it an element identifier 18.
  • the element identifier 18 will be placed in a record 19 which also includes associated data 20.
  • the associated data may relate to the nature of the packaging of the element and in subsequent steps in the supply chain may relate to events that occur during transport of the element 17 either individually or as part of a package component.
  • the elements 18 may be encapsulated in a carton which in turn may be encapsulated in a carton which may in turn be encapsulated in a container for conveyance.
  • the container may be transported involving various events including
  • a digital device 16 may interrogate the element identifier that is associated physically with the element and then check against data records in database 15.
  • Blockchain For the purposes of this patent when we refer to Blockchain, we will mean any data structure in the form of a distributed ledger (whether a centralised, decentralised or a hybrid ledger is implemented and operated) including any adaptation or derivation of such a concept.
  • a Blockchain may involve a private blockchain combined with a public ledger.
  • An individual item whether each is a discrete item, object or a product (“Item”), can have its authenticity and origin proven when verification information (“Item ID”) is displayed or made readable or detectable, within, on or about the Item.
  • the relevant Item's Item ID is then read, checked, matched or otherwise interrogated (“Checked”) against the data stored on the
  • the Item ID may be in the form of a chemical signal, embedded chip, bar code, QR code, signal or any other means (“Code”) that will enable the verification information to be extracted, read, detected or to be Checked by any other means.
  • Code any other means
  • the Originator (defined below) will have the option of bundling the Item with other similar Items (with each Item having its own respective Item ID). Equally the Originator may elect to distribute an Item in an unbundled format. In that case, the System would be adapted to still provide verification in relation to the lone Item.
  • Originator the person or entity that holds the authority that brings the item's ID into existence and places that Item ID onto the Blockchain.
  • Custodian The person or entity that receives the custody of an Item when the Originator transfers custody of the Item through the Blockchain to the Custodian. A Custodian will use the Application to interact with the
  • Blockchain to either accept or transfer the custody of an Item.
  • a Custodian may at any time in turn transfer the custody of an Item to another Custodian who inherits the same right to transfer custody of the Item to yet another Custodian.
  • a Monitor may be any person interested in the custody of the Item, such as a transporter, shipping agent, ship's crew, port authority, customs officer, warehouse staff etc.
  • the Seller will use the Application to interact with and Check data on the Blockchain.
  • the Seller also holds the rights and power to transfer the custody of an Item to another Custodian. It is acknowledged that ownership may not change when the Item is transferred from one Custodian to another. In certain circumstances, the act of sale is akin to the transfer of custody in return for payment.
  • the Seller will inform the Blockchain that the custody (or ownership) of the Item is being transferred to the new Custodian. Whether that person receiving custody of the Item is a new Custodian or a buyer does not matter for the purposes of the System - unless the buyer is a consumer ("Consumer"). If the buyer is a Consumer, a more detailed level of
  • the System is merely a means of recording of a custodial chain. Neither the Application, nor the System, alters the prevailing legal rights.
  • the act of registration may be recorded on the Blockchain.
  • the Blockchain can be Checked by the Consumer using the Application.
  • the Consumer has the same rights and power to accept the custody of an Item from another Custodian (who in this case of the sale of the Item would be the seller). Ownership will transfer when the Item is transferred to the buyer/Consumer in accordance with the settled law of the applicable jurisdiction.
  • An example of such a right would be an expiry date for the Item. After a certain date, the Item may no longer be validly transferred and the Item would be denoted on the Blockchain (if a Check was conducted after that date) as being an expired Item.
  • Auditor An auditor or any other interested third party may use the
  • This data would include any information recorded on the Blockchain in relation to the Item's origins, rights limits or the Item's chain of custody.
  • the power to originate an Item ID is open to any person who wishes to assume the role of Originator.
  • Originator's may have more complex operational requirements where they wish to authorise members of their approved network to interact with an Item or Items by directly interacting with the data record of the Item/s placed on the Blockchain.
  • Such authorised network members may include, but not be limited to: transport entities, shipping agents, vessels, warehouse operators,
  • the Originator may elect to establish a register of approved network members.
  • the register may be a 'central registry' function conducted by the Originator or a trusted third party.
  • the public keys of each network member may be recorded on the Blockchain against the Item ID of each relevant Item.
  • this authorisation matrix may be segregated, varied or adapted in any way that is preferred by the Originator.
  • the rules in effect the devolved authority to validly deal with an Item) may be varied for a certain Item or group of Items as best suits the Originator's requirements.
  • Such a register may be designed to be a further protective measure to limit the power of other persons to validly interact with an Item or indeed, a shipment of Items. Restricting the valid access to a pre-approved network of authorised members may better protect and maintain control over the provenance of an Item. Network members would be authorised to interact with an Item in an approved manner that does not break the custodial chain.
  • Example One example would be where a container was being shipped from the factory of the Originator overseas to Australia.
  • the Originator may establish a set or rules. Those rules may have the flexibility to address less common or infrequent occurrences. That flexibility would maintain the chain of custody and the chain of custody would not be broken if the Australian customs or quarantine authorities opened the container (an Item) for inspection. The authorities may even exercise their discretion to open sub-Items (such as pallets, cartons or packets) as will be outlined in a later examples. The rules may have the flexibility to address such events.
  • the authorities may also have the power to "reseal" (for the purposes of the custodial chain) an Item.
  • the power/authority to reseal an Item may be a power the Originator restricts and does not grant to other network
  • the authority to validly unpack an Item may also be restricted, e.g. a retailer may only have the authority to validly open a carton, while the authority to open a container or pallet may be restricted to an authorised distributor who is a network member authorised to exercise that power.
  • An originator may also sub-delegate certain powers, e.g. a distributor may be empowered to add or remove authorised retailers from the network of members. In such a case the power granted by the Originator may limit the power a distributor can exercise to only relate to a carton. So, a retailer can validly open a carton and display the items on the self for sale.
  • a distributor may be empowered to add or remove authorised retailers from the network of members.
  • the power granted by the Originator may limit the power a distributor can exercise to only relate to a carton. So, a retailer can validly open a carton and display the items on the self for sale.
  • the System may be deployed in many varying ways. One way would be to gather Items together in a small group. A number of small groups would then be combined or bundled into a larger group for ease of handling or otherwise.
  • a number of large groups would then be bundled together into an even larger group.
  • a number of even larger groups would then be bundled together in a much larger group. This grouping process may continue to any number of levels.
  • each level the individual group would receive its own Item ID.
  • Item ID For the sake of clarity, it is important to note that a discrete Item ID would be assigned at each grouping level.
  • the transferor would use the transferor's own private key to inform the Blockchain that a transfer of the custody of the particular Item ID was to be transferred to the transferee's public key. This process would be the same whether the Item ID pertained to an individual Item or a given grouping level of Items.
  • Originator may at the end of the tablet manufacturing assembly line, bundle a certain number of tablets.
  • this bundling may be in the form or tablets being encased in a bottle, tablets being encased in foil sheets with those sheets then being placed into a package.
  • the bundling method or process may be varied as required.
  • Carton The Originator may then bundle any number of packets (each packet bearing its own unique Item ID) into a sealed carton. Once the carton is sealed, the Originator would then assign the carton an Item ID. A marker of that Item ID would be attached by the Originator to the Item. The relevant data would be added to the token of the new Item (carton) on the Blockchain using the Application. The data stored on the Blockchain in relation to that Item ID would denote that this Item was sealed with each of the relevant Items (in this case packets) stored inside that Item (in this case a carton).
  • Pallet At the next step of the packaging process, the Originator may bundle a number of cartons onto a pallet and the pallet and piled cartons may then be encased in plastic or otherwise be secured and sealed. Once the pallet is sealed, the Originator would then assign the pallet an Item ID.
  • a marker of that Item ID would be attached by the Originator to this newly created Item. The relevant data would be added to the token of the
  • Container At the next step of the packaging process, the Originator may bundle a number of pallets into a container and the container may then be secured and sealed. When the container is sealed, the Originator would then assign the container an Item ID. A marker of that Item ID would be attached by the Originator to the Item. The relevant data would be added to the token of the new Item (container) on the Blockchain using the
  • each Item bears its own Item ID
  • a bundled group of items is assigned its own Item ID
  • each bundled group would be noted as holding a grouping of the next smaller level of bundled Items (a container would hold x pallets, a pallet would hold x cartons, a carton would hold x packets) with all those details being recorded on the Blockchain).
  • RO/AU including all of the individual Items that comprise the container's contents.
  • the token would also contain any other rights, limits or conditions that the Originator elected to ascribe to that Item or any individual Item (or sub-item) in the chain of Items.
  • the rights, limits or conditions may be ascribed down to the smallest bundling level of Items that had been assigned an Item ID.
  • the Item in this case a container
  • the Originator would use the Application to record that release on the Blockchain.
  • the release would take place when custody of the Item was first transferred. That transfer would then be noted on the token for that Item on the Blockchain. It may even be a transfer from the assembly line to the Originator's warehouse facility to await shipping.
  • the private key of the Originator would transfer custody of the token (being the Item ID) on the Blockchain to the transferee (in this case the transport company). It is a fundamental component of this system that only the Originator is able to conduct the first transfer of custody to the transferee. Custody must be pushed by the transferor, it can't be pulled by the token (being the Item ID) on the Blockchain to the transferee (in this case the transport company). It is a fundamental component of this system that only the Originator is able to conduct the first transfer of custody to the transferee. Custody must be pushed by the transferor, it can't be pulled by the
  • the transport company will, in turn deliver the Item to the port
  • the Item (in this case the
  • Monitors such as customs officials will have the right to inspect and validly open, inspect and re-seal any container (and any sub-bundles). That right may be granted by the Originator at the time the goods were packaged or through any valid update to the Item's data on the Blockchain.
  • the unpacking process may then begin.
  • an Item (container) will be noted on the Blockchain as having been unsealed and the token of the smaller item level (pallet) would then be activated on the Blockchain.
  • activation means that the Items at that level of the packaging process may then be enabled to have their custody transferred.
  • a transport company may, in turn, deliver an individual carton to the pharmacy. Both the transport company and the pharmacy would then use the application to update the status of the Item (carton) status on the Blockchain.
  • the pharmacy would then use the Application to update the carton's token on the Blockchain.
  • the act of breaking the seal of the carton would, in accordance with the rules established by the Originator during the packaging process, activate the item to be validly ready for sale.
  • the pharmacy would use the Application to update the token of each packet of tablets on the Blockchain. It would be denoted on the
  • the pharmacy would place and display for sale the individual Items (packets) on the shelves of the pharmacy.
  • a Consumer shopping in the pharmacy can then use the Application to verify the authenticity of the Item (packet) displayed for sale by the pharmacy.
  • Blockchain that an irregularity has occurred in the packaging or shipping process
  • This authorisation step may or may not be required.
  • the Consumer will then take the Item to the counter to offer to purchase the Item.
  • the pharmacy will be entitled to sell/transfer the Item to the Consumer.
  • the pharmacy/seller will use the Application to transfer/sell the Item to the Consumer.
  • the pharmacy in a preferred form may be the holder of the correct private key associated with the already verified custodial chain for that Item.
  • That same private key must have been used to designate the product as being ready for sale when the Item was placed on the display shelf. That display for sale process, will be enabled if the same private key was used to update the Blockchain when the seal of the carton was broken.
  • the Application will update the tokens of all Items in the next bundling level up (in this case a carton). That update will mark all unused Items in that bundle (carton) as being suspect due to a detected anomaly.
  • the upwards notification of the anomaly would continue to cascade up the supply chain in accordance with any notification rules established by the Originator at the time the relevant Item was originated.
  • the Originator would receive direct notice of the anomaly in
  • Another feature is that if an anomaly is reported on one item, then that anomaly report should affect the associated items in either the carton, pallet or container depending on the prevailing circumstances, e.g. if we used the traffic light concept: All items would have ' green status' until an anomaly was detected over one item. That detection should turn the status of the entire carton to 'amber status'. If further anomalies were detected then at a certain level of anomalies and depending on the anomaly pattern the further detection should create warnings for the entire carton, pallet or container that may result in all the items associated with that carton, pallet or container being marked red and being listed as either spent items or item not suitable for sale or supply.
  • the carton may then be withdrawn from sale by the pharmacy and returned to the manufacturer/Originator for a refund.
  • This capability is an optional feature that is one of the rights the Originator will have the power to impose (or elect not to impose) at the time the Item is originated.
  • a further ability the Originator may elect to exercise is the power to
  • Such conditions may relate to temperature, location or any one of
  • the Device matches the Item to the relevant Item ID on the Blockchain.
  • Checking the Blockchain for data stored in relation to a given Item ID may be part of the custody transfer process.
  • the Device in accordance with Originator's settings, reports a state (e.g. which may included the satisfaction or breach of a condition).
  • the Originator may be a meat packing business that requires its
  • a sensor/device (“Device”) may be installed in or on the Item and the Originator may match that Item to the relevant Item ID on the Blockchain.
  • a Device would report a state (which may included the satisfaction or breach of a condition)at a given point in time and add that data to the
  • Blockchain so that data can be later retrieved and determined.
  • the Device may be read by any person accepting custody of the Item as set out in the previous example.
  • the ability to read the Device would primarily depend on:
  • the location of the Device (being within, around or on the Item);
  • the Originator may elect to only have the data read at the final distribution point. At that time, the Device may be read to determine if the Condition was satisfied at all times during the shipping process.
  • the Device may be read (with the outcome of that Check being recorded on the Blockchain) to determine if the shipment was kept within the required temperature range at all times during the shipping process and the shipment was therefore suitable and safe for sale and
  • An advantage of an intermediate Check or verification of the status of Device and whetherthe Condition remained satisfied is that liability may more effectively be determined if a breach of the Condition resulted in loss or damage or any other claim related to the Item.
  • An intermediate Check on the status of the Device may help identify a range of pertinent data. Some useful data may be to indicate:
  • the entity liable (a central registry, as discussed above, may assist in this process though it is not strictly necessary) for the breach.
  • An entity may be deemed liable for the breach either as a function of:
  • some of the data the Device may be enabled to record/display/indicate/report may include:
  • the Originator is a car rental company that has
  • a Device may be installed on or in the vehicle (Item) by the rental company (Originator) to retain a record of the Item's location at all times during the relevant hire period. For record verification, that Device may periodically update (e.g. daily) the data record of the Item on the Blockchain.
  • the Item may be authorised to immediately report any anomalies (that the Device detects) against the Item ID recorded on the Blockchain.
  • the authority to report/record data on the Blockchain against any given Item ID may be delegated by the Originator to either the Item, the Device or both.
  • the Originator may check the Device and/or the data record stored on the Blockchain in relation to the relevant Item ID to determine if the condition was breached.
  • the Originator may have originally charged a condition compliance premium from the hirer. If the Condition was not breached, the Originator may return that premium amount to the hirer.
  • the currency may be even be the digital currency of a sovereign state.
  • counterfeiters are attracted to the brand. Often that brand reputation has been earned and built over decades or even centuries of hard work. It can easily be eroded or destroyed if fake or sub-standard product penetrates the supply chain.
  • the System can be used to provide regulators with insights into the particular supply chain. Through the System the regulator may determine the source and quantities of the raw materials and audit the volumes being distributed.
  • the System may be used to issue each bottle with a unique ID that can then be tracked through the entire supply chain to the store shelf.
  • the consumer interested in buying a bottle of wine can scan the code on the bottle using the System's app and confirm that there are no supply chain threats detected and the bottle is indeed genuine wine produced in the region stated on the bottle.
  • a combination of embodiments of the present invention as described herein and digital currency can automate that system providing immediate payment to the artist when an item is sold. That process would be
  • the System may be used to generate a unique ID that is assigned to each artwork. That ID would confirm the provenance of the artwork from the time it was created through its entire ownership history - an important evidentiary trail for matters concerning authenticity, proof of ownership and it would also be a daunting fraud protection measure.
  • a manufacturer may be required by law (or in compliance with their own internal ethical production practices) to track the existence of items they have sold. Some major international furniture stores already have a pilot program running to repair or recycle furniture.
  • the System may be used to assign an ID to each of these items and that identity may be traced from manufacture, to sale and finally to recycling or disposal.
  • a manufacturer may also elect to distribute their products by air freight.
  • the same principles would apply to air freight as would apply for marine cargo.
  • the Originator would use the System and apply the encrypted ID to the Item that would then be placed into a carton that was similarly identified.
  • the cartons would be loaded into an air container that was also given an encrypted identification.
  • RO/AU supply chain A trucking company would collect the packed container from the Originator's warehouse and deliver the identified cargo to the terminal which would in this example be an air port rather than a sea port.
  • the air container would be identified similarly to a sea container and then it would be loaded onto an aircraft.
  • the path from the destination airport would be similar to the processes used for sea shipments from port to store.
  • a user may purchase an individual item from a specified entity the facilities the sale on a website or mobile site.
  • the individual item has associated with it a code.
  • the user may use the Application to enter the code associated with that item and receives verification that the code is a genuine code associated with the genuine item and confirmation that the code has not previously been 'spent' or extinguished.
  • a high value item or an item that is intended for resale by consumers may be tagged with a code to the effect "do not extinguish” with the end result that the identifier will be retained on record indefinitely.
  • the Originator may inform the buyer that the code will not be extinguished.
  • This method would be used where the item was a collectible or other asset type where a historical record of a chain of custody may be important or useful.
  • different protocols would be applied by the Originator to the code associated with the item.
  • a chain of ownership would commence when the item was shipped and each subsequent custodial change (which may include changes of ownership) would be recorded against the item's code.
  • the physical item 34 being the fulfillment of virtual item 31 , may have associated with it physically code X.
  • a user may use an application 35 executed on a digital device 36 to read the code X and to compare code X with the code stored on server 33. If the codes match, then the user may be confident that the physical item 34 originated from the originator and is therefore genuine in the sense that it has been supplied directly by or with the sponsorship approval and control of the originator responsible for site 30.
  • a lookup table 37 is maintained on server 33 for a wide array of goods or items.
  • the lookup table is
  • Figure 8 illustrates a further embodiment of the system applied at the granular level and incorporating a timeout facility.
  • an originator 110 prepares elements and assigns
  • the aggregated (and packed) elements are then made available for transfer to a custodian 120.
  • the transfer step 113 is available to be executed only during an active window 114.
  • the active window 114 comprises a predetermined time out period. In a preferred form this time out period may be, for example, 3 minutes. If the transfer step 113 is executed within the active window 114 then the goods are recorded as transferred to the custodian 120.
  • the custodian must record acceptance of the item at an acceptance step 121 resulting in data entry into the custodial chain.
  • the aggregated elements are then de-aggregated in an unpack step 131 as part of an extinguisher step 130 in the supply chain sequence.
  • the de-aggregated items are then checked in a checking step 140 whereby each de-aggregated item is checked for authenticity.
  • This facility is used to advantage when implemented as an application on a hand-held device. In a particular form it may be implemented as an application on a smart phone. In a preferred form there may be two versions of the application for use in different contexts. One is a supply version used by originators, custodians and other entities involved in the supply chain.
  • the customers will use a bare-feature consumer app. It is not capable of transferring custody. However, it does set out the history of the supply chain movements for the particular item being scanned. It also sets out a history of items that have been scanned.
  • RO/AU the code be presented with a message that custody of the item is held by someone else. This all changes once the custodian has activated a transfer of custody. Then a scan will present the person with the option to accept or reject custody of the item. Again, they must take this action within the timeout period (in preferred forms set at three minutes)
  • Figure 9 illustrates a further exemplary embodiment of the system of the present invention.
  • the system 200 is exemplified by a relatively complex supply chain comprising physical processing components including manufacturer/supplier 210, first transportation 211 (land-based), second transportation 212 (sea based), mechanical handling 213 between the first mode of transport and the second mode of transport, further mechanical handling 214 between the second mode of transport and a third mode of transport 215 and a buyer/consumer 216.
  • a database 221 receives granular data 222 from all steps along the supply chain including but not limited to at the point of transfer 223 from one component in the system 200 to another component in the system 200.
  • Figure 10 illustrates yet a further exemplary embodiment of the system of the present invention applied in the context of selective data retention and selective data availability.
  • like components are numbered as for the embodiment illustrated in figure 9 except in the 300 series.
  • the database 321 is supported by a reception of extended granular data 322 combined with additional data feeds in the data structures of the database 321 whereby the data records are segmented whereby selected portions of data record 330 are available to users of the system 300 on a selective basis. So, for example, a first user may be able to access only record 331 of the data structure 330 whilst another user may be permitted to
  • RO/AU access records 331 and 332 In some forms the accessibility to a record will be based on an additional parameter to identity-it may include time for example. Alternatively or in addition it may be based on the location of an item along the chain. That is data in selected fields may be available only whilst an item is, for example, located between a first point of transfer and a second point of transfer.
  • the system, 300 makes use of information stored progressively in a database - in preferred forms as a distributed ledger - more preferably of the Blockchain type.
  • the purpose of the system is to verify the contents, security and location of a shipment of items ("System"). It uses information gathered as an item moves along a custodial chain of handlers who pack, store or transport that particular item. It does not matter to the System how many custodians hold and later transfer the item.
  • the System is concerned with the following information ("Shipment Information”):
  • the System allows its customers to access the Shipment Information and to make commercial decisions based on that information.
  • the commercial decisions may relate to decisions related to finance, insurance, legal, or other business issues.
  • the System provides information about 'what' is 'where' and 'when'.
  • the System also confirms that the 'what' remains unchanged during the movement of the container along the supply chain.
  • a contract data construct is a term given to a data construct that is stored on the database, 321.
  • Data entered into the data construct, 330 is shaped by legal processes and concepts to form a method to partly or fully automate contracts ("Smart Contract"). That automation capability may mean that a number of parties are involved in the contract.
  • Those parties to the Smart Contract may also elect to share some or all the data they individually enter.
  • the data may be entered into the handheld data acquisition device, 324, at points along the supply chain, for on communication to the database, 321.
  • This information sharing may eliminate information duplication as it may eliminate or minimize the repetitive input of similar or identical data by each party into their own data systems.
  • Smart Contracts may be reliant on the existence of certain information that triggers the contract's specified action.
  • the contract's provisions may be triggered and the ownership of the goods may then pass from the seller to the buyer.
  • Intrinsic to that change of ownership may be the change in liability and insurance risks that may happen at the same time.
  • Smart Contracts Other parties who may participate in a Smart Contract and the related supply chain would be packaging companies, manufacturers, warehouses, logistics companies and brokers, trucking companies, distributors and stores. Depending on the mode of transport, rail yards, railways, shipping lines, sea ports, airlines or airports may also be involved in a particular Smart Contract.
  • the System can be interrogated by a user which is either a Smart Contract application or the operator of a smart contract application.
  • RO/AU [0260] A shipment of wine is to be sold by the seller to a buyer in China.
  • the shipment is a DES shipment (Delivered Ex Ship).
  • DES shipment Delivery Ex Ship
  • it is the seller's responsibility to get the goods to the port of destination or to engage the forwarder to move the cargo to the port of destination uncleared.
  • 'Delivery' occurs when the goods arrive in the
  • the shipment is one container filled with the Seller's wine.
  • the wine is packed into cartons. Cartons are loaded on pallets. Pallets are loaded into the container and the container is sealed.
  • the Container is provided with a unique identifying number which may or may not be an encrypted identifier.
  • the Seller has engaged the services of a freight forwarding company to transport the Container to the Buyer.
  • the freight forward arranges for a trucking company to collect the Container from the Seller's premises.
  • the trucking company collects the Container and transports it to the port.
  • the port takes custody of the Container which is subsequently loaded onto a ship.
  • the ship transports the Container to Shanghai.
  • the parties involved in the relevant smart contract are the Seller, the freight forwarding company, the trucking company, the port, the shipping company and the receiving port and the Buyer.
  • the accountants, bankers, insurers and lawyers for all the various parties may also have an interest in the Smart Contract and the progress of the shipment.
  • the point of delivery may vary from contract to contract depending on the terms agreed between the respective Seller and Buyer. In some instances, the point where ownership and liability move could take place very early in the supply chain.
  • the information stored in the system on a distributed ledger could be accessed by the Smart Contract to determine if the trigger point for a particular transaction has been reached.
  • An auditor or any other interested third party may use the application to interrogate the database, 321 , to determine the status of a given Item. This
  • RO/AU data would include any information recorded on the database in relation to the Item's origins, rights limits or the Item's chain of custody.
  • Blockchain structures may be used to advantage with any of the above described embodiments.
  • Figure 11 is a diagram of an exemplary block chain data structure
  • Figure 12 illustrates diagrammatically use of the block chain data
  • Blockchain is a data structure and distributed record system, which seeks to provide a data structure and system which maintains a complete record of all transactions and minimizes risk of retrospective alterations, or double or identical transactions.
  • the data structure consists of a series of transactions grouped in
  • Rules may be set so no data is ever deleted, with the longest chain being taken to be the most recent, and so the chain records all transactions from its initiation in chronological order.
  • a copy of the chain is kept by all users, and so is a distributed record system. Before any transactions are added the majority of the users need to agree that the transaction is acceptable and then it is bundled with other acceptable transactions into a block, which is added to the chain. Each block has a header which can only be created knowing all the previous
  • each block includes verified transactions and the blockchain maintains a ledger all prior transactions.
  • the blockchain is duplicated by all the computers on a network.
  • the first block in the chain is known as the Genesis block and new blocks can be added in linear and chronological order. From any given block in the chain the information of this genesis block and all blocks that led back to this one can be retrieved.
  • a blockchain is essentially numerous blocks connected through hash chaining where each block is comprised of the following
  • Timestamp provides proof that the data in a block existed at a
  • Previous Hash Essentially a pointer to the previous block
  • the blockchain is managed by a network of distributed nodes where each node contains a copy of the entire blockchain.
  • Each node in the network can add blocks to the chain, where every node is adding blocks at the same point in the chain at the same time.
  • the more nodes that comprise the network the harder it is to disrupt the storage of the blockchain.
  • there is no single point of failure in these distributed nodes network If you change the content of a block you change its Hash.
  • Embodiments of the invention as described by way of example above may be utilised with advantage in supply chain management with particular reference to be able to identify anomalies in the chain such as the

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Operations Research (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A method for recording a custodial chain and identifying anomalies in the chain; said method comprising defining or identifying a first element and assigning a first element identifier to it; associating the first element identifier physically with the first element; defining or identifying at least a second element and assigning a second element identifier to it; associating the second element identifier physically with the second element; aggregating the at least first element and second element physically as an aggregated element and assigning an aggregated element identifier to it; defining an aggregated element record which includes the aggregated element identifier and the at least first element identifier and the at least second element identifier; recording the identifiers as records in a database.

Description

Information System for Item Verification
TECHNICAL FIELD
[0001] The present invention relates to an information system for item
verification. The system is applicable to individual items and also to items grouped together.
[0002] Some embodiments of the present invention make use of a distributed ledger to verify the provenance and authenticity of an item ("System"). It outlines how custody of a particular item may pass between any number of custodians before reaching a potential customer. The System allows that customer to verify the authenticity of the item and check its provenance through accessing a distributed ledger.
BACKGROUND
[0003] Tracking items of stock has been used for the purposes of inventory management and to inform any person further down the supply chain where their order is in the supply chain and hence provide an estimate on arrival. Tracking stock has also been used to identify the final location of specific items in case a recall may be necessary.
[0004] It is common to mechanically attribute a tag that contains a unique ID to an item of stock. Radio frequency identification tags (RFID) being one such method that allows easy scanning of the tag so that information can be read from the tag and sent directly to a database or other management system.
[0005] There exists systems that can record the location of an item of stock each time it is scanned and thus track its physical location as it moves through the supply chain (US 6901304B2). This system has been extended to use a virtual world to illustrate the location of stock and even relate the speed of travel to external events such as traffic delays (US7969306B2). The limitation of both these systems is that they only track a single tag, and so at each new location the tag needs to be scanned, which may involve
Substitute Sheet
(Rule 26) RO/AU unpacking to access the tag. It thus needs to be decided whether to tag each individual item of stock or container which holds multiple items of stock.
[0006] To overcome the problem of needing to scan each tag at each new location, the use of Cluster IDs allows each tag ID to be linked in the computer system to a cluster ID of the specific holding means for example a pallet in which a particular item of stock has been packed (US6496806B1 ). As a result the location of a particular item of stock may be tracked by the cluster in which it has been packed. Thus, at each new location the external of the holding means may be scanned rather than needing to unpack the holding means.
[0007] It is an object of the present invention to apply this technology to the verification of items in a supply chain at the granular level.
[0008] It is a further or alternative object to assist in the verification of identity or origin of components either individually or in groups.
SUMMARY OF THE INVENTION
[0009] In one broad form of the invention there is provided a method for
recording a custodial chain and identifying anomalies in the chain; said method comprising
defining or identifying a first element and assigning a first element identifier to it;
associating the first element identifier physically with the first element;
defining or identifying at least a second element and assigning a second element identifier to it;
associating the second element identifier physically with the second element; aggregating the at least first element and second element physically as an aggregated element and assigning an aggregated element identifier to it; defining an aggregated element record which includes the aggregated element identifier and the at least first element identifier and the at least second element identifier;
recording the identifiers as records in a database.
[0010] Preferably the method further includes associating a sub element with
Substitute Sheet
(Rule 26) RO/AU each element identifier; the sub element containing data related to the element identifier and its passage along the chain.
[0011] Preferably the database is in the form of a blockchain structure.
[0012] Preferably the database is in the form of a distributed database
structure.
[0013] Preferably the sub-element contains customization data.
[0014] Preferably the customization data includes a custodian identifier
unique to each custodian in the chain.
[0015] Preferably the method comprises multiple, successive aggregation steps, followed by multiple de-aggregation steps,
[0016] Preferably the method comprises multiple, successive aggregation steps, defining multiple successive aggregation records, followed by multiple de-aggregation steps, made with reference to the aggregation records.
[0017] Preferably the steps in the chain include spending, allocating,
transacting.
[0018] Preferably the method further includes the step of reading and
communicating the identifiers to the database each time an event occurs in the custodial chain
[0019] preferably the method further includes the step of amending the sub element at the time of each event.
[0020] Preferably the method further includes the step of amending which occurs during a step of spending.
[0021] Preferably the method further includes a checking step which involves checking that each identifier is identified only once at each step/event in the chain.
[0022] Preferably the method further includes the step of raising an alarm condition if identifier is identified more than once or if an identifier does not exist in the database.
[0023] In a preferred form an alarm condition is excluded if the sub element data is changed as part of an event.
[0024] In a preferred form the sub element includes the address of a holder [0025] In a preferred form the sub element includes rules created by the
originator.
[0026] Preferably the sub element includes rules created by the originator.
Substitute Sheet
(Rule 26) RO/AU [0027] In a further broad form of the invention there is provided a method of verification of an aspect of an item; said method comprising of ascribing a unique identifier to the item in respect of that aspect; storing the unique identifier in a table referenced against the item on a server; causing transmission of the item from a first location to a second location; a user accessing by reference to the item itself the unique identifier ascribed to the item; causing a comparison of the unique identifier thus obtained with the unique identifier stored on the server referenced against the item whereby the aspect of the item is verified if the unique identifier thus obtained matches with the unique identifier stored on the server referenced against the item.
[0028] Preferably the aspect comprises the origin of the item.
[0029] Preferably the aspect comprises the sponsorship or approval of the item.
[0030] Preferably the aspect comprises the originator of the item.
[0031] Preferably the table is maintained in a blockchain structure maintained by and accessible across a multiplicity of servers.
[0032] In yet a further broad form of the invention there is provided a
computer program comprising of at least one instruction for controlling a computer system for to implement the method described above.
[0033] A computer readable medium storing a computer program in as
described above.
[0034] A communications signal transmitted by an electronic system
implementing the method described above.
[0035] In yet a further broad form of the invention there is provided a system of verification of an aspect of an item; said system comprising a processor which ascribes a unique identifier to the item in respect of that aspect; the processor storing the unique identifier in a table in memory referenced against the item on a server; causing transmission of the item from a first location to a second location by use of a communications system; a user accessing by use of a digital device and by reference to the item itself the unique identifier ascribed to the item; the digital device and the processor causing a comparison of the unique identifier thus obtained with the unique identifier stored on the server referenced against the item whereby the aspect of the item is verified if the unique identifier thus obtained matches
Substitute Sheet
(Rule 26) RO/AU with the unique identifier stored on the server referenced against the item.
[0036] Preferably the aspect comprises the origin of the item.
[0037] Preferably the aspect comprises the sponsorship or approval of the item.
[0038] Preferably the aspect comprises the origin of the item.
[0039] Preferably the aspect comprises the sponsorship or approval of the item.
[0040] Preferably the aspect comprises the originator of the item.
[0041] Preferably the table is maintained in a blockchain structure maintained by and accessible across a multiplicity of servers.
[0042] Preferably the table is maintained in a blockchain structure maintained by and accessible across a multiplicity of servers.
BRIEF DESCRIPTION OF DRAWINGS
[0043] Figure 1A illustrates in block diagram form packing steps in
accordance with embodiments of the invention,
[0044] Figure 1 B illustrates an end to end process in accordance with
embodiments of the invention from packing steps through transfer steps to unpacking steps.
[0045] Figure 1 C illustrates in detail the application of element identifiers and sub elements during packing steps of the process of figure 1 B,
[0046] figure 2 illustrates an example of an unpacking and verification process [0047] figure 3 illustrates a scanning step utilising a digital device
[0048] figure 4 illustrates a package condition process
[0049] figure 5 illustrates a location reporting process and
[0050] figure 6 illustrates an identification of an anomaly in the form of an
unauthorised item process.
[0051] Figure 7 illustrates a further example of the system applied at the
granular level to control of individual items.
[0052] Figure 8 illustrates a further embodiment of the system applied at the granular level and incorporating a timeout facility.
[0053] Figure 9 illustrates a further exemplary embodiment of the system of the present invention
Substitute Sheet
(Rule 26) RO/AU [0054] Figure 10 illustrates yet a further exemplary embodiment of the system of the present invention applied in the context of selective data retention and selective data availability.
[0055] Figure 11 is an diagram of an exemplary block chain data structure [0056] Figure 12 illustrates diagrammatically use of the block chain data
structure of figure 11.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
[0057] Embodiments of the present invention relate to a system, and
associated method for using the system, in order to track items of stock and record details of packing and unpacking of items in a supply chain.
[0058] In preferred forms embodiments of the system are capable of allowing multiple levels of packing assigning tags to each new packaging level. For example, the item of stock is a single package with a Tag ID, this is then packed in a carton which is given a carton ID, the pallets are then packed into a pallet which is given a pallet ID, and the pallets are packed into a container which is given a container ID. To move stock in a packed or unpacked form it is necessary to assign a custodian. The custodial chain starts when the manufacturer hands custody to the first custodian who in turn passes custody along the supply chain. Custodians may be freight
forwarders, rail, trucking, port, container terminal, and warehouse operators or other allied members of the supply chain who move goods along the chain from the factory to the store shelf. The stock is transported and passed along the supply chain until it eventually reaches the shop owner who fully unpacks and displays the stock.
[0059] To record the movement of stock, it is necessary to have a database of all items of stock, the way in which they are packaged, and their
transportation. This database needs to be shared by all users and each user allowed to update the database in accordance with their position. In one form the database may be implemented by a Blockchain structure as a distributed database system intended to maintain a complete record and be secure against alteration.
[0060] To record the packing and then unpacking of the items of stock, as well as transfer of packed items to a new custodian the present system treats
Substitute Sheet
(Rule 26) RO/AU each action as a transaction recording this in a database that follows a blockchain structure. Each action is a transaction recorded permanently. Each user, be it the manufacturer, a supply chain participant, wholesaler, or a store, may (but is not required) to keep a copy of the database following the distributed ledger feature of blockchain. The reason to use a distributed ledger when tracking items of stock is to allow a validation of the path that any particular item has followed and to minimise the risk of tampering (or identify it with a faulty record) anywhere along the chain. Any alteration of the blockchain will result in an error message and the stock affected by the identified alteration can be removed from circulation for inspection.
[0061] By maintaining a complete record of the movement of any item of
stock using the blockchain structure means that a customer can trace back the movement of any item of stock and so have confidence that non-genuine items are not being sold or resold.
[0062] With reference to figures 1A, 1 B, 1 C the system 10 may operate
conceptually as follows:
[0063] With reference to figure 1 B in one form the system 10 involves,
broadly, a "packing" step 11 , a transfer step 12 and an unpacking step 13.
[0064] Relevant data 14 is recorded in and referenced against database 15.
[0065] The relevant data 14 is recognised and interrogated by digital devices during the various steps. In one form the digital devices take the form of smartphones or tablets16.
[0066] Figure 1 C illustrates in detail one example of a packing step 11.
[0067] In this instance an element 17 will have associated physically with it an element identifier 18. The element identifier 18 will be placed in a record 19 which also includes associated data 20. The associated data may relate to the nature of the packaging of the element and in subsequent steps in the supply chain may relate to events that occur during transport of the element 17 either individually or as part of a package component.
[0068] In that regard, with reference to figure 1 B the elements 18 may be encapsulated in a carton which in turn may be encapsulated in a carton which may in turn be encapsulated in a container for conveyance.
[0069] The container may be transported involving various events including
Substitute Sheet
(Rule 26) RO/AU inspection by Customs and the like before it eventually experiences an unpacking step 13 wherein a reverse process to that illustrated in figure 1 B occurs.
[0070] At steps along the way, a digital device 16 may interrogate the element identifier that is associated physically with the element and then check against data records in database 15.
[0071] For the purposes of this patent when we refer to Blockchain, we will mean any data structure in the form of a distributed ledger (whether a centralised, decentralised or a hybrid ledger is implemented and operated) including any adaptation or derivation of such a concept. As an example of the flexibility of this definition, a Blockchain may involve a private blockchain combined with a public ledger.
[0072] An individual item, whether each is a discrete item, object or a product ("Item"), can have its authenticity and origin proven when verification information ("Item ID") is displayed or made readable or detectable, within, on or about the Item. The relevant Item's Item ID is then read, checked, matched or otherwise interrogated ("Checked") against the data stored on the
Blockchain.
[0073] The Item ID may be in the form of a chemical signal, embedded chip, bar code, QR code, signal or any other means ("Code") that will enable the verification information to be extracted, read, detected or to be Checked by any other means.
[0074] Throughout this document we will generically refer to placement of the Code in, on or about an Item as being a process where a marker of the individual Item ID would be attached to the relevant Item.
[0075] When the Item is Checked, the Code will be checked and verified
through the use of an application which may be displayed or deployed on any suitable device ("Application"). The Application will recognise various functions for which a user may wish to have the Code Checked.
Substitute Sheet
(Rule 26) RO/AU [0076] The Originator (defined below) will have the option of bundling the Item with other similar Items (with each Item having its own respective Item ID). Equally the Originator may elect to distribute an Item in an unbundled format. In that case, the System would be adapted to still provide verification in relation to the lone Item.
[0077] Some examples of those functions would be:
[0078] Originator: the person or entity that holds the authority that brings the item's ID into existence and places that Item ID onto the Blockchain.
[0079] Custodian: The person or entity that receives the custody of an Item when the Originator transfers custody of the Item through the Blockchain to the Custodian. A Custodian will use the Application to interact with the
Blockchain to either accept or transfer the custody of an Item. A Custodian may at any time in turn transfer the custody of an Item to another Custodian who inherits the same right to transfer custody of the Item to yet another Custodian.
[0080] Monitor: At any point in time, the Blockchain may be Checked to
determine the current custodial status of the Item. A Monitor may be any person interested in the custody of the Item, such as a transporter, shipping agent, ship's crew, port authority, customs officer, warehouse staff etc.
[0081] Seller: The Seller will use the Application to interact with and Check data on the Blockchain. The Seller also holds the rights and power to transfer the custody of an Item to another Custodian. It is acknowledged that ownership may not change when the Item is transferred from one Custodian to another. In certain circumstances, the act of sale is akin to the transfer of custody in return for payment. The Seller will inform the Blockchain that the custody (or ownership) of the Item is being transferred to the new Custodian. Whether that person receiving custody of the Item is a new Custodian or a buyer does not matter for the purposes of the System - unless the buyer is a consumer ("Consumer"). If the buyer is a Consumer, a more detailed level of
Substitute Sheet
(Rule 26) RO/AU interaction with the Application and the Blockchain will take place. The distinction of how a Consumer interacts with the Application will be explained in more detail later in this document. When any transfer takes place, matters such as agency, custodial rights, escrow, title and ownership will be
determined by normal legal methods and will sit outside the System. The System is merely a means of recording of a custodial chain. Neither the Application, nor the System, alters the prevailing legal rights.
[0082] If the Item was to be registered on a personal property security register or any other external registry system, the act of registration may be recorded on the Blockchain.
[0083] Consumer: the Blockchain can be Checked by the Consumer using the Application. The Consumer has the same rights and power to accept the custody of an Item from another Custodian (who in this case of the sale of the Item would be the seller). Ownership will transfer when the Item is transferred to the buyer/Consumer in accordance with the settled law of the applicable jurisdiction.
[0084] The buyer/Consumer will also enjoy title to the Item subject to any
rights or limitations that may have been imposed by the Originator at the time the Item was originated and registered on the Blockchain.
[0085] An example of such a right would be an expiry date for the Item. After a certain date, the Item may no longer be validly transferred and the Item would be denoted on the Blockchain (if a Check was conducted after that date) as being an expired Item.
[0086] Auditor: An auditor or any other interested third party may use the
application to interrogate the Blockchain to determine the status of a given Item. This data would include any information recorded on the Blockchain in relation to the Item's origins, rights limits or the Item's chain of custody.
Substitute Sheet
(Rule 26) RO/AU Item ID Origination
[0087] The power to originate an Item ID is open to any person who wishes to assume the role of Originator.
[0088] Some Originator's may have more complex operational requirements where they wish to authorise members of their approved network to interact with an Item or Items by directly interacting with the data record of the Item/s placed on the Blockchain.
[0089] Such authorised network members may include, but not be limited to: transport entities, shipping agents, vessels, warehouse operators,
distributors, retailers and public authorities such as customs and quarantine officers.
[0090] The Originator may elect to establish a register of approved network members. The register may be a 'central registry' function conducted by the Originator or a trusted third party. The public keys of each network member may be recorded on the Blockchain against the Item ID of each relevant Item. Of course, this authorisation matrix may be segregated, varied or adapted in any way that is preferred by the Originator. The rules (in effect the devolved authority to validly deal with an Item) may be varied for a certain Item or group of Items as best suits the Originator's requirements.
[0091] Such a register may be designed to be a further protective measure to limit the power of other persons to validly interact with an Item or indeed, a shipment of Items. Restricting the valid access to a pre-approved network of authorised members may better protect and maintain control over the provenance of an Item. Network members would be authorised to interact with an Item in an approved manner that does not break the custodial chain.
[0092] Example: One example would be where a container was being shipped from the factory of the Originator overseas to Australia.
Substitute Sheet
(Rule 26) RO/AU [0093] The Originator may establish a set or rules. Those rules may have the flexibility to address less common or infrequent occurrences. That flexibility would maintain the chain of custody and the chain of custody would not be broken if the Australian customs or quarantine authorities opened the container (an Item) for inspection. The authorities may even exercise their discretion to open sub-Items (such as pallets, cartons or packets) as will be outlined in a later examples. The rules may have the flexibility to address such events.
[0094] The power issued to the Australian officers would be to use the
relevant authority's private key to break a seal (which would otherwise alter the custodial chain if a seal was broken by an unauthorised third party).
[0095] The authorities may also have the power to "reseal" (for the purposes of the custodial chain) an Item. The power/authority to reseal an Item may be a power the Originator restricts and does not grant to other network
members. Equally the authority to validly unpack an Item may also be restricted, e.g. a retailer may only have the authority to validly open a carton, while the authority to open a container or pallet may be restricted to an authorised distributor who is a network member authorised to exercise that power.
[0096] An originator may also sub-delegate certain powers, e.g. a distributor may be empowered to add or remove authorised retailers from the network of members. In such a case the power granted by the Originator may limit the power a distributor can exercise to only relate to a carton. So, a retailer can validly open a carton and display the items on the self for sale.
[0097] Devolving this power may, in some circumstances, yield security
benefits as the distributor may authorise a specific retailer to be the only entity validly entitled to open an individual carton (Item).
[0098] Local knowledge and regular interaction between distributors and
retailers may mean this level of control is a useful option the Originator may
Substitute Sheet
(Rule 26) RO/AU utilise.
[0099] The shipment process will be explained (along with a usage example) in greater detail below.
Concepts
[0100] The System may be deployed in many varying ways. One way would be to gather Items together in a small group. A number of small groups would then be combined or bundled into a larger group for ease of handling or otherwise.
[0101] A number of large groups would then be bundled together into an even larger group. A number of even larger groups would then be bundled together in a much larger group. This grouping process may continue to any number of levels.
[0102] At each level the individual group would receive its own Item ID. For the sake of clarity, it is important to note that a discrete Item ID would be assigned at each grouping level.
[0 03] When the custody of a group of Items is transferred from one party to another, the transferor must authorise that transfer by pushing the custodial authority to the transferee. That transfer would be performed through the Blockchain.
[0104] The transferor would use the transferor's own private key to inform the Blockchain that a transfer of the custody of the particular Item ID was to be transferred to the transferee's public key. This process would be the same whether the Item ID pertained to an individual Item or a given grouping level of Items.
Substitute Sheet
(Rule 26) RO/AU Origination and Distribution Example
[0105] With reference to figure 1A, a pharmaceutical manufacturer (an
Originator) may at the end of the tablet manufacturing assembly line, bundle a certain number of tablets. In such an example, this bundling may be in the form or tablets being encased in a bottle, tablets being encased in foil sheets with those sheets then being placed into a package. Of course, the bundling method or process may be varied as required.
[0106] Package: The bundled tablets (bundled into a package for the
purposes of this example) would then be assigned an Item ID by the manufacturer/Originator using the Originator's private key held by the manufacturer. A marker of that Item ID would be attached by the Originator to the Item. Details of the Item ID would then be entered into the relevant new Item's (package's) token on the Blockchain using the Application. In this way, the Item would be created and the Item would become an active element or token on the Blockchain.
[0107] Carton: The Originator may then bundle any number of packets (each packet bearing its own unique Item ID) into a sealed carton. Once the carton is sealed, the Originator would then assign the carton an Item ID. A marker of that Item ID would be attached by the Originator to the Item. The relevant data would be added to the token of the new Item (carton) on the Blockchain using the Application. The data stored on the Blockchain in relation to that Item ID would denote that this Item was sealed with each of the relevant Items (in this case packets) stored inside that Item (in this case a carton).
[0108] Pallet: At the next step of the packaging process, the Originator may bundle a number of cartons onto a pallet and the pallet and piled cartons may then be encased in plastic or otherwise be secured and sealed. Once the pallet is sealed, the Originator would then assign the pallet an Item ID.
[0109] A marker of that Item ID would be attached by the Originator to this newly created Item. The relevant data would be added to the token of the
Substitute Sheet
(Rule 26) RO/AU new Item (pallet) on the Blockchain using the Application. The data stored on the Blockchain in relation to that Item ID would denote that this Item was sealed with each of the relevant Items (in this case cartons) stored inside that Item (in this case a pallet).
[0110] Container: At the next step of the packaging process, the Originator may bundle a number of pallets into a container and the container may then be secured and sealed. When the container is sealed, the Originator would then assign the container an Item ID. A marker of that Item ID would be attached by the Originator to the Item. The relevant data would be added to the token of the new Item (container) on the Blockchain using the
Application. The data stored on the Blockchain in relation to that Item ID would denote that this Item was sealed with each of the relevant Items (in this case pallets) stored inside that Item (in this case a container).
[0111] There is no requirement for any particular packaging methodology to be followed. The principle is simply that:
[0112] each Item bears its own Item ID;
[0113] a marker of that Item ID would be attached by the Originator to the Item
[0114] the token of the new Item on the Blockchain would have the updated data stored using the Application;
[0115] a bundled group of items is assigned its own Item ID;
[0116] each bundled group would be noted as holding a grouping of the next smaller level of bundled Items (a container would hold x pallets, a pallet would hold x cartons, a carton would hold x packets) with all those details being recorded on the Blockchain).
Origination Rights
[0117] At the end of the packaging process, the Originator would use the
Application to denote on the item's token on the Blockchain (in this case the container's token) that the container was validly originated by the Originator
Substitute Sheet
(Rule 26) RO/AU (including all of the individual Items that comprise the container's contents).
[0118] As stated above, the token would also contain any other rights, limits or conditions that the Originator elected to ascribe to that Item or any individual Item (or sub-item) in the chain of Items. The rights, limits or conditions may be ascribed down to the smallest bundling level of Items that had been assigned an Item ID.
Custodial Chain Example
[0119] Upon the completion of the packing process the Item (in this case a container) would be formally released for distribution by the Originator. The Originator would use the Application to record that release on the Blockchain.
[0120] In practice, the release would take place when custody of the Item was first transferred. That transfer would then be noted on the token for that Item on the Blockchain. It may even be a transfer from the assembly line to the Originator's warehouse facility to await shipping.
Distribution
[0121] The private key of the Originator would transfer custody of the token (being the Item ID) on the Blockchain to the transferee (in this case the transport company). It is a fundamental component of this system that only the Originator is able to conduct the first transfer of custody to the transferee. Custody must be pushed by the transferor, it can't be pulled by the
transferee.
[0122] The transport company will, in turn deliver the Item to the port
company with both the transferor (transport company) and the transferee (port company) using the Application to inform and update the Item's token on the Blockchain regarding the change of custody. The rights and obligations of the custody will take effect as it would under any other custody transfer
Substitute Sheet
(Rule 26) RO/AU process.
[0123] The custodial chain will continue through any number of transfer
points, from port company to ship, from ship to port company at the ship's destination, from port company to transport company and from transport company to the distributor's warehouse.
[0124] At all stages of the supply chain process, the Item (in this case the
container) will remain sealed.
[0125] When the seal of the Item (container) is broken the person breaking the seal must use the application to update the Item's token on the Blockchain.
Inspection
[0126] Monitors such as customs officials will have the right to inspect and validly open, inspect and re-seal any container (and any sub-bundles). That right may be granted by the Originator at the time the goods were packaged or through any valid update to the Item's data on the Blockchain.
[0127] The Originator will be informed of such changes (as much as is
permitted by law) through updates on the Item's record on the Blockchain. If any discrepancy in the custodial chain is detected by the Originator then all of the affected items may be withdrawn from sale.
Unpacking
[0128] With reference to figure 2, the unpacking process may then begin. In that process, an Item (container) will be noted on the Blockchain as having been unsealed and the token of the smaller item level (pallet) would then be activated on the Blockchain. In this case activation means that the Items at that level of the packaging process may then be enabled to have their custody transferred.
Substitute Sheet
(Rule 26) RO/AU [0129] A custodial chain for an individual pallet may then occur. Any changes in custody would again take place by both the transferee and the transferor using the application to interact with the Blockchain. There may be any number of changes in the custody of the Item (pallet) with each transfer being recorded on the Blockchain.
[0130] The seal of the pallet may then be broken. A similar unpacking process would be noted through the Application with the affected tokens being updated on the Blockchain. This means the tokens of the individual cartons would be activated, thus enabling custody of an individual carton to be transferred. There may be any number of changes in the custody of the enclosed Items (cartons) with each transfer (of a carton) being recorded on the Blockchain.
[0131] A transport company may, in turn, deliver an individual carton to the pharmacy. Both the transport company and the pharmacy would then use the application to update the status of the Item (carton) status on the Blockchain.
Display for Sale
[0132] The pharmacy would then use the Application to update the carton's token on the Blockchain. The act of breaking the seal of the carton would, in accordance with the rules established by the Originator during the packaging process, activate the item to be validly ready for sale.
[0133] The Items would be readied for display on the shelves of the
pharmacy. The pharmacy would use the Application to update the token of each packet of tablets on the Blockchain. It would be denoted on the
Blockchain that each Item (packet), bearing its own Item ID, would now be validly authorised for sale to a Consumer.
[0134] The pharmacy would place and display for sale the individual Items (packets) on the shelves of the pharmacy.
Substitute Sheet
(Rule 26) RO/AU Consumer Protection
[0135] A Consumer shopping in the pharmacy can then use the Application to verify the authenticity of the Item (packet) displayed for sale by the pharmacy.
Verification
[0136] With reference to figure 3, the Consumer will use the Application to read the Item ID of the packet they are considering purchasing. The
Application will analyse the data stored on the Blockchain in relation to that individual Item.
[0137] The consideration performed during the analysis will include, but is not limited to, an analysis of:
[0138] whether the Originator is anentity registered with the Application;
[0139] whether the valid private key of the Originator was used;
[0140] whether the Originator has given notice to the Application (through the
Blockchain) that an irregularity has occurred in the packaging or shipping process;
[0141] whether the Originator has recalled the product and the Item has been withdrawn from sale;
[0142] whether there has been any irregularities detected by the Application
(through the Blockchain being Checked) or reported by the Originator or any third party during the supply process;
[0143] whether the pharmacy, being the base (or sales level) unpacker in the custodial chain has authorised the product (by using the Application to verify the product was authorised for sale when it was placed on the pharmacy's display shelf);
[0144] This authorisation step may or may not be required.
[0145] whether the token for the individual Item has previously been spent (double spends of an Item's token will not by permitted by the Application) e.g. by the item having been sold through a point-of-sale device or any other process that means the item has reached the end of the supply chain for that particular item.
Substitute Sheet
(Rule 26) RO/AU Verification Confirmation
[0146] If the analysis of the data stored on the Blockchain in relation to the relevant Item ID does not detect any anomaly, the Consumer will be informed that no defect in the title of the Item was detected on the Blockchain. A message (or image such as a tick) will be displayed on the Application.
Verification Rejection
[0147] If the analysis of the data stored on the Blockchain in relation to the relevant Item ID does detect an anomaly, including if the product has been recalled or withdrawn from sale, a message (or image such as a cross) will be displayed on the Application.
Point of Sale
[0148] If the verification was confirmed, the Consumer will then take the Item to the counter to offer to purchase the Item. At the counter, the pharmacy will be entitled to sell/transfer the Item to the Consumer.
[0149] The pharmacy/seller will use the Application to transfer/sell the Item to the Consumer.
[0150] In order to sell the Item the pharmacy in a preferred form may be the holder of the correct private key associated with the already verified custodial chain for that Item.
[0151] That same private key must have been used to designate the product as being ready for sale when the Item was placed on the display shelf. That display for sale process, will be enabled if the same private key was used to update the Blockchain when the seal of the carton was broken.
Consumer Warnings
Substitute Sheet
(Rule 26) RO/AU [0152] The Consumer must be informed to only buy an unopened packet (as is standard practice).
[0153] The Consumer must be warned that while an individual packet may be a copy, no more than one packet bearing an individual Item ID can ever be validly sold. The limit to only sell one counterfeit item is a very unattractive proposition for a counterfeiter. The amount of effort and cost that would have to be expended per item would be a strong disincentive against copying.
Double Spends Prevented
[0154] Further protection for the Consumer will be provided as the Application will check if any packet from the respective carton has ever been sold in another location. If that is the case, the Consumer will be warned that the Item ID has not been satisfactorily verified (if this is a setting or condition chosen by the Originator).
Anomaly Reports
[0155] If any anomaly related to a particular Item ID is detected by the
Application, the Application will update the tokens of all Items in the next bundling level up (in this case a carton). That update will mark all unused Items in that bundle (carton) as being suspect due to a detected anomaly. The upwards notification of the anomaly would continue to cascade up the supply chain in accordance with any notification rules established by the Originator at the time the relevant Item was originated.
[0156] The Originator would receive direct notice of the anomaly in
accordance with the notification settings set by the Originator.
Anomaly Consequences
[0 57] As an added measure of Consumer protection, once an anomaly is
Substitute Sheet
(Rule 26) RO/AU detected, all related (carton level) Items will no longer be saleable (if that is the anomaly response selected by the Originator).
[0158] Another feature is that if an anomaly is reported on one item, then that anomaly report should affect the associated items in either the carton, pallet or container depending on the prevailing circumstances, e.g. if we used the traffic light concept: All items would have ' green status' until an anomaly was detected over one item. That detection should turn the status of the entire carton to 'amber status'. If further anomalies were detected then at a certain level of anomalies and depending on the anomaly pattern the further detection should create warnings for the entire carton, pallet or container that may result in all the items associated with that carton, pallet or container being marked red and being listed as either spent items or item not suitable for sale or supply.
[0159] The carton may then be withdrawn from sale by the pharmacy and returned to the manufacturer/Originator for a refund. This capability is an optional feature that is one of the rights the Originator will have the power to impose (or elect not to impose) at the time the Item is originated.
Conditionalitv
[0160] A further ability the Originator may elect to exercise is the power to
attribute a specified condition to an Item or to require certain conditions to be met in relation to a given Item or group of Items.
[0161] Such conditions may relate to temperature, location or any one of
numerous other conditions the Originator may select ("Condition").
Temperature Condition Example
[0162] This is an example that shows how the System may be used to show something did not happen, i.e. satisfaction of the Condition (because the Condition was not breached) is determined and recorded against the Item's ID on the Blockchain.
Substitute Sheet
(Rule 26) RO/AU [0163] In summary, with reference to figure 4, a Device is installed in or on the Item and the Originator.
[0164] The Device matches the Item to the relevant Item ID on the Blockchain.
Checking the Blockchain for data stored in relation to a given Item ID may be part of the custody transfer process.
[0165] The Device in accordance with Originator's settings, reports a state (e.g. which may included the satisfaction or breach of a condition).
[0166] The Originator may be a meat packing business that requires its
shipments to be transported and delivered with the optimum temperature range for the container (Item) having been maintained during all relevant times in the shipping process.
[0167] A sensor/device ("Device") may be installed in or on the Item and the Originator may match that Item to the relevant Item ID on the Blockchain.
[0168] A Device would report a state (which may included the satisfaction or breach of a condition)at a given point in time and add that data to the
Blockchain so that data can be later retrieved and determined.
[0169] The Device may be read by any person accepting custody of the Item as set out in the previous example. The ability to read the Device would primarily depend on:
the location of the Device (being within, around or on the Item);
the ease of access to the Device; and
the Originator's chosen access, security and anti-tampering protocols.
[0170] Alternatively, the Originator may elect to only have the data read at the final distribution point. At that time, the Device may be read to determine if the Condition was satisfied at all times during the shipping process.
[0171] Stated another way, the Device may be read (with the outcome of that Check being recorded on the Blockchain) to determine if the shipment was kept within the required temperature range at all times during the shipping process and the shipment was therefore suitable and safe for sale and
Substitute Sheet
(Rule 26) RO/AU consumption.
[0172] An advantage of an intermediate Check or verification of the status of Device and whetherthe Condition remained satisfied is that liability may more effectively be determined if a breach of the Condition resulted in loss or damage or any other claim related to the Item.
[0173] An intermediate Check on the status of the Device may help identify a range of pertinent data. Some useful data may be to indicate:
where a Condition was breached;
the cause of the breach; and/or
the entity liable (a central registry, as discussed above, may assist in this process though it is not strictly necessary) for the breach.
[0174] An entity may be deemed liable for the breach either as a function of:
an act;
a failure to act; or
as a function of their custodial duties.
[0175] In the third instance (re custodial duties), some of the data the Device may be enabled to record/display/indicate/report may include:
the time of the breach;
the relevant period between Check A and Check B (when the record of the Device's data stored on the Blockchain indicates the period or shipment stage in which the Condition was breached); or the shipment stage in which the breach occurred.
Location Condition Example
[0176] With reference to figure 5, there is shown an example that shows how the System may be used to show something did happen, i.e. a breach of the Condition is determined and recorded against the Item's ID on the
Blockchain.
[0 77] Some of the other conditions we may check for are shock (was the
Substitute Sheet
(Rule 26) RO/AU container dropped, light (was the item opened), vibration, humidity, contamination by radiation or foreign chemicals), moisture etc
[0178] In this example the Originator is a car rental company that has
restrictions on where their vehicle may be taken during the hire period. For example, due to insurance requirements, the hirer may be prohibited from taking the vehicle into country X. It is clearly stated in the car hire agreement that taking the vehicle into country X would breach the conditions of hire agreed between the car company and the hirer.
[0179] A Device may be installed on or in the vehicle (Item) by the rental company (Originator) to retain a record of the Item's location at all times during the relevant hire period. For record verification, that Device may periodically update (e.g. daily) the data record of the Item on the Blockchain.
[0180] Alternatively, the Item may be authorised to immediately report any anomalies (that the Device detects) against the Item ID recorded on the Blockchain.
[0181] The authority to report/record data on the Blockchain against any given Item ID may be delegated by the Originator to either the Item, the Device or both.
[0182] When the vehicle is returned, the Originator may check the Device and/or the data record stored on the Blockchain in relation to the relevant Item ID to determine if the condition was breached.
[0183] The Originator may have originally charged a condition compliance premium from the hirer. If the Condition was not breached, the Originator may return that premium amount to the hirer.
Unauthorised Package Inserted or Substitution
[0184] It is possible for the custody protocol being set by the Originator to be
Substitute Sheet
(Rule 26) RO/AU "do not accept custody of any Item if the Item's seal has been broken by anyone other than a Monitor."
[0185] With reference to figure 6 and a means of doubling the protection, the following procedures may also be followed.
[0186] By recording the larger package ID against the smaller package it is possible to prevent unauthorized packages being inserted into an already aggregated package.
[0187] One use for this might include tainted goods included in what would otherwise be an authorized shipment.
[0188] If a package is swapped out it will not have the ID of its parent
package.
[0189] Further Examples
[0190] Fashion House Example
[0191] A fashion house concerned about supply chain integrity and ethical clothing, may obtain proof that workers were fairly paid and no child labour was involved in the production process. At present that system is difficult to enforce because the records are held by the factory and there is
considerable scope for false records to be created or for records to be altered.
[0192] If the System was used as part of a blockchain-based supply chain, then the fashion house may audit an unchangeable set of records about hours worked, salaries and factory output. If workers were paid in a digital currency such as Bitcoin and that payment process was integrated into the System, there would be an immutable record of those payments.
[0 93] In the future, the currency may be even be the digital currency of a sovereign state.
[0194] Regardless of whether a nation state issued digital currency or some other digital currency was used, the record of payment may be a verifiable and auditable fact. With the surge of interest in blockchain technology, many companies are working on verification tools that can mine blockchain
Substitute Sheet
(Rule 26) RO/AU records. It will be increasingly possible for other important data to be analysed and confirmed. The System may be integrated into those
processes.
[0195] Equally, consumers of those items would also be able to interrogate the System (using the unique ID of the garment they purchased) to verify that the clothing, footwear, handbag or another item was ethically produced.
[0196] Industry Regulator Example
[0197] There is an increasing recognition of the importance of protecting
regional brand reputation and authenticity.
[0198] The threat of fake or counterfeit products is clear. Counterfeiters are misappropriating a brand reputation for quality and reliability. Those market traits have considerable value and that worth is the very reason the
counterfeiters are attracted to the brand. Often that brand reputation has been earned and built over decades or even centuries of hard work. It can easily be eroded or destroyed if fake or sub-standard product penetrates the supply chain.
[0199] The System can be used to provide regulators with insights into the particular supply chain. Through the System the regulator may determine the source and quantities of the raw materials and audit the volumes being distributed.
[0200] If we take wine for example: a wine regulatory body may look at the records of the quantity and origin of grapes being delivered into the
production chain and then determine the volume of authenticated wine that may be produced by the relevant bottling facility. Transparency and
auditability would preserve the integrity of the region's brand reputation.
[0201] When combined with our food safety example, the System may be used to issue each bottle with a unique ID that can then be tracked through the entire supply chain to the store shelf. The consumer interested in buying a bottle of wine can scan the code on the bottle using the System's app and confirm that there are no supply chain threats detected and the bottle is indeed genuine wine produced in the region stated on the bottle.
[0202] Artwork Collector Example
[0203] Under the Artist Resale Royalty Scheme, the Copyright Agency of Australia has been appointed by the government to collect royalties when
Substitute Sheet
(Rule 26) RO/AU artworks are resold and to distribute those royalties to the relevant artist.
[0204] A combination of embodiments of the present invention as described herein and digital currency can automate that system providing immediate payment to the artist when an item is sold. That process would be
underpinned by fully transparent and auditable accounting records.
[0205] As mentioned above, the System may be used to generate a unique ID that is assigned to each artwork. That ID would confirm the provenance of the artwork from the time it was created through its entire ownership history - an important evidentiary trail for matters concerning authenticity, proof of ownership and it would also be a formidable fraud protection measure.
[0206] Recycling Example
[0207] A manufacturer may be required by law (or in compliance with their own internal ethical production practices) to track the existence of items they have sold. Some major international furniture stores already have a pilot program running to repair or recycle furniture.
[0208] In Australia, a major international furniture store already has processes in place for the recycling of cardboard boxes and paper packing, light bulbs, batteries and mattresses. It seems reasonable to assume that more products will be added to that list over time.
[0209] The System may be used to assign an ID to each of these items and that identity may be traced from manufacture, to sale and finally to recycling or disposal.
[0210] The record keeping immutability and certainty of blockchain data would be useful in this process. As mentioned in other examples above, the ability to make payments using a digital currency may also be integrated into this use of the System.
[0211] Air Freight Example
[0212] A manufacturer may also elect to distribute their products by air freight.
The same principles would apply to air freight as would apply for marine cargo. The Originator would use the System and apply the encrypted ID to the Item that would then be placed into a carton that was similarly identified. The cartons would be loaded into an air container that was also given an encrypted identification.
[02 3] The air freight supply chain processes would be similar to the shipping
Substitute Sheet
(Rule 26) RO/AU supply chain. A trucking company would collect the packed container from the Originator's warehouse and deliver the identified cargo to the terminal which would in this example be an air port rather than a sea port.
[0214] Then, the air container would be identified similarly to a sea container and then it would be loaded onto an aircraft.
[0215] The path from the destination airport would be similar to the processes used for sea shipments from port to store.
[0216] Online Example
[0217] Items sold online may also use the System. Figure 7 illustrates a
further example of the System applied at the granular level to control individual items.
[0218] With reference to figure 7, a user may purchase an individual item from a specified entity the facilities the sale on a website or mobile site. The individual item has associated with it a code. On receipt of the actual item, the user may use the Application to enter the code associated with that item and receives verification that the code is a genuine code associated with the genuine item and confirmation that the code has not previously been 'spent' or extinguished.
[0219] Once the system registers that the enquiry has been made and
answered, the code is then extinguished from the system or otherwise not made available for reuse.
[0220] High Value or Resale Items
[0221 ] For example, a high value item or an item that is intended for resale by consumers may be tagged with a code to the effect "do not extinguish" with the end result that the identifier will be retained on record indefinitely.
[0222] That is, in certain circumstances, the Originator may inform the buyer that the code will not be extinguished. This method would be used where the item was a collectible or other asset type where a historical record of a chain of custody may be important or useful. In these circumstances, different protocols would be applied by the Originator to the code associated with the item. A chain of ownership would commence when the item was shipped and each subsequent custodial change (which may include changes of ownership) would be recorded against the item's code.
[0223] With reference to figure 7, a purchaser may visit a site 30 having
Substitute Sheet
(Rule 26) RO/AU available thereon item 31 (represented virtually) for sale (in this instance designated item X). There will be associated with item 31 a unique code 32 (in this instance designated code X). The code will not be available to the user by way of the site30 but will be stored on server 33 referenced against item X.
[0224] The physical item 34, being the fulfillment of virtual item 31 , may have associated with it physically code X. On delivery of physical item 34, a user may use an application 35 executed on a digital device 36 to read the code X and to compare code X with the code stored on server 33. If the codes match, then the user may be confident that the physical item 34 originated from the originator and is therefore genuine in the sense that it has been supplied directly by or with the sponsorship approval and control of the originator responsible for site 30.
[0225] In preferred forms, a lookup table 37 is maintained on server 33 for a wide array of goods or items. In preferred forms, the lookup table is
maintained in a blockchain structure maintained by and accessible across a multiplicity of servers 33.
FURTHER EMBODIMENTS
[0226] Figure 8 illustrates a further embodiment of the system applied at the granular level and incorporating a timeout facility.
[0227] With reference to Figure 8 there is illustrated a flowchart of an
exemplary implementation of the previously described embodiments.
[0228] In this instance an originator 110 prepares elements and assigns
element identifiers in a generation step 111. The elements are then
aggregated and packed in a packing step 112. The aggregated (and packed) elements are then made available for transfer to a custodian 120. In this instance the transfer step 113 is available to be executed only during an active window 114. The active window 114 comprises a predetermined time out period. In a preferred form this time out period may be, for example, 3 minutes. If the transfer step 113 is executed within the active window 114 then the goods are recorded as transferred to the custodian 120. The custodian must record acceptance of the item at an acceptance step 121 resulting in data entry into the custodial chain.
Substitute Sheet
(Rule 26) RO/AU [0229] The aggregated elements are then de-aggregated in an unpack step 131 as part of an extinguisher step 130 in the supply chain sequence. The de-aggregated items are then checked in a checking step 140 whereby each de-aggregated item is checked for authenticity.
[0230] More specifically with reference to Figure 8, 9, 0, there is described a time-out process. If the recipient does not accept the item within the sender activating the custodial release of the item, then the release simply lapses. It must then be reactivated by the sender.
[0231] The person with custody of the item will continue to hold the item until they transfer custody. If that person scans the code they are presented with the choice to either transfer the custody of the item or to cancel.
[0232] The person wishing to receive custody of the item will upon scanning the code be presented with a message that custody of the item is held by someone else. This all changes once the custodian has activated a transfer of custody. Then a scan will present the person with the option to accept or reject custody of the item. Again, they must take this action within the timeout period (currently set at three minutes)
[0233] This facility is used to advantage when implemented as an application on a hand-held device. In a particular form it may be implemented as an application on a smart phone. In a preferred form there may be two versions of the application for use in different contexts. One is a supply version used by originators, custodians and other entities involved in the supply chain.
[0234] The customers will use a bare-feature consumer app. It is not capable of transferring custody. However, it does set out the history of the supply chain movements for the particular item being scanned. It also sets out a history of items that have been scanned.
[0235] An important feature of the app design for the supply version is that it may simplify the user interaction.
[0236] In preferred form a user cannot do anything that is not permitted
according to their categorization in the supply chain.
[0237] The person with custody of the item will continue to hold the item until they transfer custody. If that person scans the code they are presented with the choice to either transfer the custody of the item or to cancel.
[0238] The person wishing to receive custody of the item will upon scanning
Substitute Sheet
(Rule 26) RO/AU the code be presented with a message that custody of the item is held by someone else. This all changes once the custodian has activated a transfer of custody. Then a scan will present the person with the option to accept or reject custody of the item. Again, they must take this action within the timeout period (in preferred forms set at three minutes)
[0239] Figure 9 illustrates a further exemplary embodiment of the system of the present invention.
[0240] In this instance the system 200 is exemplified by a relatively complex supply chain comprising physical processing components including manufacturer/supplier 210, first transportation 211 (land-based), second transportation 212 (sea based), mechanical handling 213 between the first mode of transport and the second mode of transport, further mechanical handling 214 between the second mode of transport and a third mode of transport 215 and a buyer/consumer 216.
[0241] In addition there are virtual supply chain components including insurer 217 investor 218, first bank 219 and second bank 220.
[0242] A database 221 receives granular data 222 from all steps along the supply chain including but not limited to at the point of transfer 223 from one component in the system 200 to another component in the system 200.
[0243] In preferred forms a hand-held data acquisition device 224 as
described in earlier embodiments is utilised in at least some points in the chain including in at least some points of transfer 223 to acquire the granular data 222 for communication to database 221.
[0244] Figure 10 illustrates yet a further exemplary embodiment of the system of the present invention applied in the context of selective data retention and selective data availability. In this instance like components are numbered as for the embodiment illustrated in figure 9 except in the 300 series. In this instance the database 321 is supported by a reception of extended granular data 322 combined with additional data feeds in the data structures of the database 321 whereby the data records are segmented whereby selected portions of data record 330 are available to users of the system 300 on a selective basis. So, for example, a first user may be able to access only record 331 of the data structure 330 whilst another user may be permitted to
Substitute Sheet
(Rule 26) RO/AU access records 331 and 332. In some forms the accessibility to a record will be based on an additional parameter to identity-it may include time for example. Alternatively or in addition it may be based on the location of an item along the chain. That is data in selected fields may be available only whilst an item is, for example, located between a first point of transfer and a second point of transfer.
[0245] With particular reference to the arrangement of figure 10, and by way of exemplification of it; the system, 300, makes use of information stored progressively in a database - in preferred forms as a distributed ledger - more preferably of the Blockchain type. The purpose of the system is to verify the contents, security and location of a shipment of items ("System"). It uses information gathered as an item moves along a custodial chain of handlers who pack, store or transport that particular item. It does not matter to the System how many custodians hold and later transfer the item.
[0246] The System is concerned with the following information ("Shipment Information"):
1. certainty about the identity of one or more items that may be grouped and packed inside a carton and/or pallet which are then placed into a shipping container either for land, sea, rail or air freight;
2. gathering, storing, disseminating and using information about the container and its contents as a whole;
3. certainty that the content of the container remains intact or that any changes to those items are known; and
4. certainty about the location of the container.
[0247] External Use of the System's Information
[0248] The System allows its customers to access the Shipment Information and to make commercial decisions based on that information.
[0249] The commercial decisions may relate to decisions related to finance, insurance, legal, or other business issues.
[0250] The System provides information about 'what' is 'where' and 'when'.
The System also confirms that the 'what' remains unchanged during the movement of the container along the supply chain.
[0251] Contract data construct
Substitute Sheet
(Rule 26) RO/AU [0252] A contract data construct is a term given to a data construct that is stored on the database, 321. Data entered into the data construct, 330, is shaped by legal processes and concepts to form a method to partly or fully automate contracts ("Smart Contract"). That automation capability may mean that a number of parties are involved in the contract.
[0253] Those parties to the Smart Contract may also elect to share some or all the data they individually enter. The data may be entered into the handheld data acquisition device, 324, at points along the supply chain, for on communication to the database, 321. This information sharing may eliminate information duplication as it may eliminate or minimize the repetitive input of similar or identical data by each party into their own data systems.
[0254] The concept of Smart Contracts may be reliant on the existence of certain information that triggers the contract's specified action. In the case of a Smart Contract for the supply of goods, the contract's provisions may be triggered and the ownership of the goods may then pass from the seller to the buyer. Intrinsic to that change of ownership may be the change in liability and insurance risks that may happen at the same time.
[0255] Any insurers, banks, law firms and accountants that are party to the Smart Contract will have an interest in the effect of the provisions of the contract being triggered in ownership and liability be passed from the seller to the buyer.
[0256] Other parties who may participate in a Smart Contract and the related supply chain would be packaging companies, manufacturers, warehouses, logistics companies and brokers, trucking companies, distributors and stores. Depending on the mode of transport, rail yards, railways, shipping lines, sea ports, airlines or airports may also be involved in a particular Smart Contract.
[0257] When a Smart Contract's provisions are activated, that trigger is often described as requiring third party information that establishes the relevant facts that cause the trigger to be activated.
[0258] Because the System has gathered and stored the data on the supply chain movement of a container, the System can be interrogated by a user which is either a Smart Contract application or the operator of a smart contract application.
[0259] Example:
Substitute Sheet
(Rule 26) RO/AU [0260] A shipment of wine is to be sold by the seller to a buyer in China.
Under the sale terms, payment for the shipment of wine is to be made when the wine is landed in Shanghai.
[0261] The shipment is a DES shipment (Delivered Ex Ship). In this type of transaction, it is the seller's responsibility to get the goods to the port of destination or to engage the forwarder to move the cargo to the port of destination uncleared. 'Delivery' occurs when the goods arrive in the
Shanghai port.
[0262] The shipment is one container filled with the Seller's wine. The wine is packed into cartons. Cartons are loaded on pallets. Pallets are loaded into the container and the container is sealed.
[0263] The Container is provided with a unique identifying number which may or may not be an encrypted identifier.
[0264] The Seller has engaged the services of a freight forwarding company to transport the Container to the Buyer. The freight forward arranges for a trucking company to collect the Container from the Seller's premises.
[0265] The trucking company collects the Container and transports it to the port. The port takes custody of the Container which is subsequently loaded onto a ship. The ship transports the Container to Shanghai.
[0266] The parties involved in the relevant smart contract are the Seller, the freight forwarding company, the trucking company, the port, the shipping company and the receiving port and the Buyer. The accountants, bankers, insurers and lawyers for all the various parties may also have an interest in the Smart Contract and the progress of the shipment.
[0267] The point of delivery may vary from contract to contract depending on the terms agreed between the respective Seller and Buyer. In some instances, the point where ownership and liability move could take place very early in the supply chain.
[0268] Regardless of the terms, the information stored in the system on a distributed ledger could be accessed by the Smart Contract to determine if the trigger point for a particular transaction has been reached.
[0269] Auditing
[0270] An auditor or any other interested third party may use the application to interrogate the database, 321 , to determine the status of a given Item. This
Substitute Sheet
(Rule 26) RO/AU data would include any information recorded on the database in relation to the Item's origins, rights limits or the Item's chain of custody.
[0271] Sealing Certainty
[0272] In the case that customs or other regulatory authority needs to validly access the Container and the device or technology, the system allows them to take custody of the item, and this is recorded on the database. As a result, a degree of certainty regarding when a container was opened may be obtained.
BLOCK CHAIN STRUCTURES
[0273] Blockchain structures may be used to advantage with any of the above described embodiments.
[0274] Figure 11 is a diagram of an exemplary block chain data structure
[0275] Figure 12 illustrates diagrammatically use of the block chain data
structure of figure 11.
[0276] With reference to figures 11 and 12, Blockchain is a data structure and distributed record system, which seeks to provide a data structure and system which maintains a complete record of all transactions and minimizes risk of retrospective alterations, or double or identical transactions.
[0277] The data structure consists of a series of transactions grouped in
blocks, which need to be verified before they are added to the chain. Rules may be set so no data is ever deleted, with the longest chain being taken to be the most recent, and so the chain records all transactions from its initiation in chronological order.
[0278] A copy of the chain is kept by all users, and so is a distributed record system. Before any transactions are added the majority of the users need to agree that the transaction is acceptable and then it is bundled with other acceptable transactions into a block, which is added to the chain. Each block has a header which can only be created knowing all the previous
transactions. As a result ,if a retrospective alteration is made the header will be incorrect and any new block proposed by that user will be rejected. The security of the system is further enhanced by having mathematical problems that can only be solved by trial and error, which use the header and must be solved and then verified by the majority of other users before a block is
Substitute Sheet
(Rule 26) RO/AU accepted into the chain by all users. As long as there are more genuine users than coordinated attackers trying to alter the chain then the chain will be secure. There may be other methods used to determine the veracity of a block of data, this may include voting or consent processes where parties with a stake in the transaction or related transactions or in the chain itself are granted 'voting' rights. Another process may involve a random or
systematized voting or approval system where the validity of the block of data is approved in accordance with a set of protocols agreed by those with a stake in the veracity of the chain of data..
[0279] In a more particular form, each block includes verified transactions and the blockchain maintains a ledger all prior transactions. The blockchain is duplicated by all the computers on a network.
[0280] The first block in the chain is known as the Genesis block and new blocks can be added in linear and chronological order. From any given block in the chain the information of this genesis block and all blocks that led back to this one can be retrieved. A blockchain is essentially numerous blocks connected through hash chaining where each block is comprised of the following
[0281] □ Timestamp: provides proof that the data in a block existed at a
particular time
[0282] □ Previous Hash: Essentially a pointer to the previous block
[0283] □ Merkle Hash: Summary of all executed transactions
[0284] □ Nonce: Individual blocks identity and is an arbitrary number which can only be used once
[0285] The blockchain is managed by a network of distributed nodes where each node contains a copy of the entire blockchain. Each node in the network can add blocks to the chain, where every node is adding blocks at the same point in the chain at the same time. The more nodes that comprise the network the harder it is to disrupt the storage of the blockchain. Unlike centralised systems which rely on a single authority, there is no single point of failure in these distributed nodes network. If you change the content of a block you change its Hash.
Substitute Sheet
(Rule 26) RO/AU INDUSTRIAL APPLICATION
[0286] Embodiments of the invention, as described by way of example above may be utilised with advantage in supply chain management with particular reference to be able to identify anomalies in the chain such as the
introduction of non-authorised goods in the form of counterfeit goods.
Substitute Sheet
(Rule 26) RO/AU

Claims

1. A method for recording a custodial chain and identifying anomalies in the chain; said method comprising
defining or identifying a first element and assigning a first element identifier to it;
associating the first element identifier physically with the first element;
defining or identifying at least a second element and assigning a second element identifier to it;
associating the second element identifier physically with the second element; aggregating the at least first element and second element physically as an aggregated element and assigning an aggregated element identifier to it; defining an aggregated element record which includes the aggregated element identifier and the at least first element identifier and the at least second element identifier;
recording the identifiers as records in a database.
2. The method of claim 1 wherein the database is located remotely from the chain or any component of the chain.
3. The method of claim 1 further including associating a sub element with each element identifier; the sub element containing data related to the element identifier and its passage along the chain.
4. The method of claim 3, wherein the sub-element contains customization
data.
5. The method of claim 4 wherein the customization data includes a custodian identifier unique to each custodian in the chain.
6. The method of any previous claim, comprising multiple, successive
aggregation steps, followed by multiple de-aggregation steps,
7. The method of any previous claim, comprising multiple, successive
aggregation steps, defining multiple successive aggregation records, followed by multiple de-aggregation steps, made with reference to the aggregation records.
8. The method of any previous claim wherein the database is in the form of a blockchain structure.
9. The method of any previous claim wherein the steps in the chain include
spending, allocating, transacting.
Substitute Sheet
(Rule 26) RO/AU
10. The method of any previous claim further including the step of reading and communicating the identifiers to the database each time an event occurs in the custodial chain
11.The method of any previous claim further including the step of amending the sub element at the time of each event
12. the method of claim 6 wherein the step of amending occurs during a step of spending.
13. The method of any previous claim wherein a checking step involves checking that each identifier is identified only once at each step/event in the chain. 4. The method of any previous claim including the step of raising an alarm condition if identifier is identified more than once or if an identifier does not exist in the database.
15. The method of claim 9 wherein an alarm condition is excluded if the sub
element data is changed as part of an event.
16. The method of any previous claim wherein the sub element includes the
address of a holder
17. The method of any previous claim wherein the sub element includes rules created by the Originator.
18. A method of verification of an aspect of an item; said method comprising of ascribing a unique identifier to the item in respect of that aspect; storing the unique identifier in a table referenced against the item on a server; causing transmission of the item from a first location to a second location; a user accessing by reference to the item itself the unique identifier ascribed to the item; causing a comparison of the unique identifier thus obtained with the unique identifier stored on the server referenced against the item whereby the aspect of the item is verified if the unique identifier thus obtained matches with the unique identifier stored on the server referenced against the item.
19. The method of claim 18 wherein the aspect comprises the origin of the item.
20. The method of claim 18 wherein the aspect comprises the sponsorship or approval of the item.
21. The method of claim 18 wherein the aspect comprises the originator of the item.
22. The method of any one of claims 18 to 21 wherein the table is maintained in a blockchain structure maintained by and accessible across a multiplicity of
Substitute Sheet
(Rule 26) RO/AU servers.
23. A computer program comprising of at least one instruction for controlling a computer system for to implement a method in accordance with any one of claims 1 to 22.
24. A computer readable medium storing a computer program in accordance with claim 23.
25. A communications signal transmitted by an electronic system implementing a method in accordance with any one of claims 1 to 22.
26. A system of verification of an aspect of an item; said system comprising a processor which ascribes a unique identifier to the item in respect of that aspect; the processor storing the unique identifier in a table in memory referenced against the item on a server; causing transmission of the item from a first location to a second location by use of a communications system; a user accessing by use of a digital device and by reference to the item itself the unique identifier ascribed to the item; the digital device and the processor causing a comparison of the unique identifier thus obtained with the unique identifier stored on the server referenced against the item whereby the aspect of the item is verified if the unique identifier thus obtained matches with the unique identifier stored on the server referenced against the item.
27. The system of claim 26 wherein the aspect comprises the origin of the item.
28. The system of claim 26 wherein the aspect comprises the sponsorship or approval of the item.
29. The system of claim 26 wherein the aspect comprises the origin of the item.
30. The system of claim 26 wherein the aspect comprises the sponsorship or approval of the item.
31.The system of claim 26 wherein the aspect comprises the originator of the item.
32. The system of any one of claims 26 to 31 wherein the table is maintained in a blockchain structure maintained by and accessible across a multiplicity of servers.
33. The system of any one of claims 26 to 32 wherein the table is maintained in a blockchain structure maintained by and accessible across a multiplicity of servers.
34. Media containing code which, when executed by a processor, implements
Substitute Sheet
(Rule 26) RO/AU the method of any one of claims 1 to 22.
35. A handheld digital communications device incorporating at least a processor, a memory, radio communications apparatus and input output apparatus having code is stored in the memory which when executed by the processor causes the device to acquire at least one aspect of an item of the system claimed in any one of claims 26 to 33.
36. The device of claim 35 further including GPS apparatus in communication with the memory and processor whereby information as to location of the device in three-dimensional space is acquired for use and on transmission by the device.
Substitute Sheet
(Rule 26) RO/AU
PCT/AU2017/000078 2016-03-31 2017-03-31 Information system for item verification WO2017165909A1 (en)

Priority Applications (10)

Application Number Priority Date Filing Date Title
AU2017239933A AU2017239933A1 (en) 2016-03-31 2017-03-31 Information system for item verification
EP17772867.2A EP3437062B1 (en) 2016-03-31 2017-03-31 Information system for item verification
CN201780033661.6A CN109478305A (en) 2016-03-31 2017-03-31 Information system for item authentication
US16/089,995 US11367039B2 (en) 2016-03-31 2017-03-31 Information system for item verification
ES17772867T ES2956770T3 (en) 2016-03-31 2017-03-31 Information system for item verification
AU2020202384A AU2020202384A1 (en) 2016-03-31 2020-04-03 Information System for Item Verification
AU2022203457A AU2022203457A1 (en) 2016-03-31 2022-05-20 Information System for Item Verification
US17/844,711 US11900308B2 (en) 2016-03-31 2022-06-20 Information system for item verification
US17/895,593 US20230120636A1 (en) 2016-03-31 2022-08-25 Item Identification and Tracking System and Data Access and Governance System
US18/438,606 US20240265336A1 (en) 2016-03-31 2024-02-12 Information system for item verification

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
AU2016901208A AU2016901208A0 (en) 2016-03-31 Blockchain Information System for Item Verification
AU2016901208 2016-03-31
AU2017900116 2017-01-16
AU2017900116A AU2017900116A0 (en) 2017-01-16 Information System for Item Verification

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US16/089,995 A-371-Of-International US11367039B2 (en) 2016-03-31 2017-03-31 Information system for item verification
US17/844,711 Continuation US11900308B2 (en) 2016-03-31 2022-06-20 Information system for item verification

Publications (1)

Publication Number Publication Date
WO2017165909A1 true WO2017165909A1 (en) 2017-10-05

Family

ID=59962295

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/AU2017/000078 WO2017165909A1 (en) 2016-03-31 2017-03-31 Information system for item verification
PCT/AU2017/000079 WO2017165910A1 (en) 2016-03-31 2017-03-31 Tracking system

Family Applications After (1)

Application Number Title Priority Date Filing Date
PCT/AU2017/000079 WO2017165910A1 (en) 2016-03-31 2017-03-31 Tracking system

Country Status (6)

Country Link
US (3) US11367039B2 (en)
EP (1) EP3437062B1 (en)
CN (1) CN109478305A (en)
AU (3) AU2017239933A1 (en)
ES (1) ES2956770T3 (en)
WO (2) WO2017165909A1 (en)

Cited By (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019083611A1 (en) * 2017-10-27 2019-05-02 BXB Digital Pty Limited Systems and methods for executing smart contracts using a block chain
WO2019149908A1 (en) * 2018-02-02 2019-08-08 Roche Diabetes Care Gmbh A method for controlling distribution of a product in a computer network and system
WO2019152381A1 (en) * 2018-01-31 2019-08-08 Walmart Apollo, Llc System and method for digital currency via blockchain
EP3531353A1 (en) * 2018-02-27 2019-08-28 Siemens Aktiengesellschaft Method for a registration of usage of tracking data
US20190266612A1 (en) * 2018-02-28 2019-08-29 Walmart Apollo, Llc System and method for verifying products using blockchain
EP3540662A1 (en) * 2018-03-15 2019-09-18 Deutsche Telekom AG Computer implemented method for supply chain management and provenance in a data processing network
WO2019178644A1 (en) * 2018-03-21 2019-09-26 Tbsx3 Pty Ltd Item identification and tracking system and data access and governance system
WO2019190872A1 (en) 2018-03-28 2019-10-03 Konstantinos Bakalis Systems and methods for using codes and images within a blockchain
WO2019231959A1 (en) 2018-05-29 2019-12-05 Alibaba Group Holding Limited Blockchain-based commodity claim method and apparatus, and electronic device
CN110634548A (en) * 2019-09-23 2019-12-31 重庆华医康道科技有限公司 Block chain-based dispensing and medicine checking fast matching method
WO2020001996A1 (en) * 2018-06-26 2020-01-02 Bundesdruckerei Gmbh Protection against falsification and handover control of consumer goods
IT201800007031A1 (en) * 2018-07-09 2020-01-09 Giambattista Donelli METHOD FOR REGISTRATION ON PERMISSIONED BLOCKCHAIN OF THE PASSAGE OF TIMED DELIVERY OF ELECTRONICALLY LABELED PALLETS
WO2020097432A1 (en) * 2018-11-09 2020-05-14 Avery Dennison Retail Information Services, Llc Fork chain product label and method of use
US10719884B2 (en) 2018-03-30 2020-07-21 Alibaba Group Holding Limited Blockchain-based service execution method and apparatus, and electronic device
US10834095B2 (en) 2018-05-17 2020-11-10 International Business Machines Corporation Post-commit validation in a distributed ledger
AU2019204063B2 (en) * 2018-05-29 2020-11-26 Advanced New Technologies Co., Ltd. Blockchain-based merchandise tracing methods and apparatus
US10931438B2 (en) 2018-08-13 2021-02-23 International Business Machines Corporation Generating a representative article
US10956854B2 (en) 2017-10-20 2021-03-23 BXB Digital Pty Limited Systems and methods for tracking goods carriers
US10977460B2 (en) 2017-08-21 2021-04-13 BXB Digital Pty Limited Systems and methods for pallet tracking using hub and spoke architecture
US11062256B2 (en) 2019-02-25 2021-07-13 BXB Digital Pty Limited Smart physical closure in supply chain
US11184175B2 (en) 2018-07-30 2021-11-23 Hewlett Packard Enterprise Development Lp Systems and methods for using secured representations of location and user distributed ledger addresses to prove user presence at a location and time
US11233641B2 (en) 2018-07-31 2022-01-25 Hewlett Packard Enterprise Development Lp Systems and methods for using distributed attestation to verify claim of attestation holder
US11244378B2 (en) 2017-04-07 2022-02-08 BXB Digital Pty Limited Systems and methods for tracking promotions
US11249169B2 (en) 2018-12-27 2022-02-15 Chep Technology Pty Limited Site matching for asset tracking
US11250466B2 (en) 2018-07-30 2022-02-15 Hewlett Packard Enterprise Development Lp Systems and methods for using secured representations of user, asset, and location distributed ledger addresses to prove user custody of assets at a location and time
US11270403B2 (en) 2018-07-30 2022-03-08 Hewlett Packard Enterprise Development Lp Systems and methods of obtaining verifiable image of entity by embedding secured representation of entity's distributed ledger address in image
US11271908B2 (en) 2018-07-31 2022-03-08 Hewlett Packard Enterprise Development Lp Systems and methods for hiding identity of transacting party in distributed ledger transaction by hashing distributed ledger transaction ID using secured representation of distributed ledger address of transacting party as a key
US11356443B2 (en) 2018-07-30 2022-06-07 Hewlett Packard Enterprise Development Lp Systems and methods for associating a user claim proven using a distributed ledger identity with a centralized identity of the user
US11403674B2 (en) 2018-07-30 2022-08-02 Hewlett Packard Enterprise Development Lp Systems and methods for capturing time series dataset over time that includes secured representations of distributed ledger addresses
EP3847597A4 (en) * 2018-09-04 2022-08-31 Huru Systems Ltd. Tracking code generation, application, and verification using blockchain technology
EP3915072A4 (en) * 2019-01-23 2022-10-05 Cellr Pty Ltd Beverage producer authenticity verification method and system
US11488161B2 (en) 2018-07-31 2022-11-01 Hewlett Packard Enterprise Development Lp Systems and methods for providing transaction provenance of off-chain transactions using distributed ledger transactions with secured representations of distributed ledger addresses of transacting parties
US11488160B2 (en) 2018-07-30 2022-11-01 Hewlett Packard Enterprise Development Lp Systems and methods for using captured time series of secured representations of distributed ledger addresses and smart contract deployed on distributed ledger network to prove compliance
US11507771B2 (en) 2017-05-02 2022-11-22 BXB Digital Pty Limited Systems and methods for pallet identification
AT525150A1 (en) * 2021-06-01 2022-12-15 Schur Flexibles Digital Gesmbh PROCEDURES FOR VERIFIABLE DOCUMENTATION OF INFORMATION
US11652634B2 (en) 2017-11-02 2023-05-16 Nchain Licensing Ag Computer-implemented systems and methods for linking a blockchain to a digital twin
US11663549B2 (en) 2017-05-02 2023-05-30 BXB Digital Pty Limited Systems and methods for facility matching and localization
US11900307B2 (en) 2017-05-05 2024-02-13 BXB Digital Pty Limited Placement of tracking devices on pallets

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018213804A2 (en) * 2017-05-19 2018-11-22 Zest Labs, Inc. Process and condition recording and validation using a blockchain
KR102360386B1 (en) * 2017-06-02 2022-02-09 로베르토 지저스 수손 A system, method and server computer system for transforming an original entity into a verifiable and verifiable entity in a heterogeneous communication network environment
CN111164636A (en) * 2017-09-27 2020-05-15 株式会社Artrigger Transaction management method, usage right management method, communication terminal, and program
US20190108482A1 (en) * 2017-10-06 2019-04-11 Sap Se Enablement of procurement processes with asset traceability using blockchain technology
WO2019152550A1 (en) * 2018-01-31 2019-08-08 Walmart Apollo, Llc System and method for delivery vehicle security using blockchain
CN108229891A (en) * 2018-02-07 2018-06-29 徐颂 Supply chain data acquisition and verification method and system compatible with standard article codes
US20190362305A1 (en) * 2018-05-24 2019-11-28 Walmart Apollo, Llc Systems and Methods Exception Handling in a Distributed Computing Environment
WO2019226986A1 (en) 2018-05-24 2019-11-28 Walmart Apollo, Llc Nested blockchain system
US11418336B2 (en) * 2018-06-20 2022-08-16 Google Llc Digital ledger for unique item IDs with ownership
US11410174B2 (en) * 2018-08-07 2022-08-09 International Business Machines Corporation Custom blockchain for IoT devices
US10771384B2 (en) * 2018-08-17 2020-09-08 Tyson Trautmann Routing based blockchain
US11301802B1 (en) * 2018-09-13 2022-04-12 Amazon Technologies, Inc. System for facilitating returns of items
US10505726B1 (en) 2018-12-07 2019-12-10 Nike, Inc. System and method for providing cryptographically secured digital assets
US10929811B2 (en) * 2019-03-26 2021-02-23 Abb Schweiz Ag Systems and methods for mapping locations of cartons in pallets and containers
US11410105B2 (en) * 2019-07-03 2022-08-09 Vertru Technologies Inc. Blockchain based supply chain network systems
CN110390524B (en) * 2019-07-31 2021-10-26 中国工商银行股份有限公司 Method and device for processing job data in block chain, electronic equipment and storage medium
CN110525913B (en) * 2019-09-01 2021-02-02 吴卓阳 Wharf cargo transportation calculation traceability matching method
US20210097554A1 (en) 2019-10-01 2021-04-01 Manicka Institute Llc Multi-dimensional approach to anti-counterfeiting across different industries
US10607080B1 (en) * 2019-10-25 2020-03-31 7-Eleven, Inc. Feedback and training for a machine learning algorithm configured to determine customer purchases during a shopping session at a physical store
US11693979B2 (en) * 2019-11-27 2023-07-04 International Business Machines Corporation Dynamic permission assignment and enforcement for transport process
CN113383332A (en) * 2019-12-23 2021-09-10 恺细尔伯克私人有限公司 Method for ensuring the authenticity and validity of the transfer of ownership of an item
US11521156B2 (en) 2020-01-09 2022-12-06 International Business Machines Corporation Trustable product delivery with RFID and smart chip
US11570152B2 (en) 2020-02-12 2023-01-31 International Business Machines Corporation Data linkage across multiple participants
US11222292B2 (en) * 2020-02-12 2022-01-11 International Business Machines Corporation Data linkage across multiple participants
CN111340590B (en) * 2020-02-25 2023-07-04 成都即速网络科技有限公司 Collaborative operation method based on electronic commerce and distributed resale platform thereof
US11682095B2 (en) * 2020-02-25 2023-06-20 Mark Coast Methods and apparatus for performing agricultural transactions
US11720906B2 (en) * 2020-02-26 2023-08-08 Touch Point Worldwide, Inc. Blockchain-based product authentication system
CN113794569B (en) * 2020-02-27 2023-10-13 支付宝(杭州)信息技术有限公司 Material inventory data providing method, device and system based on block chain
CN111352968B (en) * 2020-02-28 2023-09-29 杭州云象网络技术有限公司 Intelligent manufacturing element identification method based on blockchain network
US20210326905A1 (en) * 2020-04-16 2021-10-21 TRU Authentication Inc. System and method for product authentication using a blockchain
US20230254155A1 (en) * 2020-07-01 2023-08-10 Nippon Telegraph And Telephone Corporation Registration terminal, verification terminal, management system and program
EP4002251A1 (en) * 2020-11-18 2022-05-25 Bobst Mex Sa Method for providing authenticity information
JP7468500B2 (en) * 2021-01-06 2024-04-16 株式会社デンソー Information management method and information provision method
WO2022149501A1 (en) * 2021-01-06 2022-07-14 株式会社デンソー Information management method and information provision method
CN115280717B (en) 2021-01-11 2024-06-07 微福斯有限责任公司 Blockchain auditing system and method
FR3137773B1 (en) 2022-07-05 2024-06-21 Neyret Textile Holding Process for associating a label with an article of the ready-to-wear type
FR3137774A1 (en) 2022-07-05 2024-01-12 Neyret Textile Holding Method for managing data relating to an article of the ready-to-wear type
US20240193537A1 (en) * 2022-12-08 2024-06-13 Zebra Technologies Corporation Systems and Methods for Tracking Item Handling Data During Logistics Operations
CN117391720B (en) * 2023-08-31 2024-05-03 广东安拓普聚合物科技股份有限公司 Recyclable plastic traceability system based on block chain
CN117635175B (en) * 2024-01-25 2024-04-09 成都纳宝科技有限公司 Block chain-based one-object one-code anti-counterfeiting traceability anti-channeling intelligent digital marketing method

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060106718A1 (en) * 2004-11-16 2006-05-18 Supplyscape Corporation Electronic chain of custody method and system
US20060235805A1 (en) * 2005-04-13 2006-10-19 Mr. Feng Peng Universal anti-counterfeit method and system
GB2429078A (en) * 2005-07-04 2007-02-14 Thierry Powis De Tenbossche Authentication system
WO2007056712A2 (en) * 2005-11-04 2007-05-18 Kestrel Wireless Inc. System and method for authenticating products
US20090230190A1 (en) * 2008-03-17 2009-09-17 Philip Morris Usa Inc. Method and apparatus for identifying, authenticating, tracking and tracing manufactured items
US7724138B2 (en) * 1999-12-16 2010-05-25 Sirit Technologies Inc. Method and system for tracking clustered items
US20110047183A1 (en) * 2009-08-24 2011-02-24 Helveta Limited Chain of custody monitoring and management
US20110154046A1 (en) * 2009-12-22 2011-06-23 Philip Morris Usa Inc. Method and apparatus for storage of data for manufactured items
US8063736B2 (en) * 2007-03-27 2011-11-22 Valmarc Corporation Authentication of source, plus, for goods and services system, method, and components
US20130185217A1 (en) * 2010-10-27 2013-07-18 Michael Fiedler Feature specification for authentication feature
WO2014098610A1 (en) * 2012-12-21 2014-06-26 Kezzler As Method and system for storing and retrieving packaging relationships

Family Cites Families (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070219916A1 (en) * 2000-03-07 2007-09-20 Michael Lucas Systems and methods for tracking and verifying the authenticity of an item
US7113922B2 (en) * 2000-11-02 2006-09-26 Living Naturally, Llc Electronic inventory movement and control device
US6948066B2 (en) * 2001-01-17 2005-09-20 International Business Machines Corporation Technique for establishing provable chain of evidence
US7424473B2 (en) * 2001-12-26 2008-09-09 Centricmedia, Inc. System and method for asset tracking with organization-property-individual model
US20030130912A1 (en) * 2002-01-04 2003-07-10 Davis Tommy Lee Equipment management system
US7969306B2 (en) 2002-01-11 2011-06-28 Sap Aktiengesellschaft Context-aware and real-time item tracking system architecture and scenarios
US6901304B2 (en) 2002-01-11 2005-05-31 Sap Aktiengesellschaft Item tracking system architectures providing real-time visibility to supply chain
GB0503972D0 (en) * 2005-02-25 2005-04-06 Firstondemand Ltd Identification systems
US7797335B2 (en) * 2007-01-18 2010-09-14 International Business Machines Corporation Creation and persistence of action metadata
CN101236623A (en) * 2008-01-04 2008-08-06 中信二十一世纪(中国)科技有限公司 Electronic monitoring code system
US8249954B2 (en) * 2008-01-18 2012-08-21 Aginfolink, Holdings, Inc., A Bvi Corporation Third-party certification using enhanced claim validation
US20180182050A1 (en) * 2009-07-17 2018-06-28 Primary Marking Systems, Inc. System and method for tracking sexual assault kit evidence
US9619851B1 (en) * 2009-07-17 2017-04-11 Primary Marking Systems, Inc. Mobile device and method for tracking evidence
US20110169602A1 (en) 2010-01-08 2011-07-14 Gaffney Gene F System and method for monitoring products in a distribution chain
US20190188984A1 (en) * 2010-09-02 2019-06-20 Chargerback, Inc. Recovery system for lost items using electronic sensors
US20150379510A1 (en) 2012-07-10 2015-12-31 Stanley Benjamin Smith Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain.
US20140032378A1 (en) * 2012-07-30 2014-01-30 Budimir Damnjanovic Product authentication process and system for preventing counterfeiting and piracy in market distribution channels
US9336248B2 (en) * 2013-04-24 2016-05-10 The Boeing Company Anomaly detection in chain-of-custody information
US20150170112A1 (en) * 2013-10-04 2015-06-18 Erly Dalvo DeCastro Systems and methods for providing multi-currency platforms comprising means for exchanging and interconverting tangible and virtual currencies in various transactions, banking operations, and wealth management scenarios
WO2015160505A1 (en) * 2014-04-14 2015-10-22 Jenda Tag Llc System and method for product authentication
US20160098723A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and method for block-chain verification of goods
US9436923B1 (en) * 2015-02-26 2016-09-06 Skuchain, Inc. Tracking unitization occurring in a supply chain
US9641338B2 (en) * 2015-03-12 2017-05-02 Skuchain, Inc. Method and apparatus for providing a universal deterministically reproducible cryptographic key-pair representation for all SKUs, shipping cartons, and items
US10185981B2 (en) * 2015-03-13 2019-01-22 GeoPRI, LLC Systems and methods for providing product information
US10217113B2 (en) * 2015-03-13 2019-02-26 GeoPRI, LLC Authentication systems and methods
US20160267432A1 (en) * 2015-03-13 2016-09-15 GeoPRI, LLC Systems and methods for tracking an individual unit
US9230231B1 (en) * 2015-03-13 2016-01-05 GeoPRI, LLC Systems and methods for managing barcode information
US20170085555A1 (en) * 2015-07-14 2017-03-23 Fmr Llc Point-to-Point Transaction Guidance Apparatuses, Methods and Systems
US10339523B2 (en) * 2015-07-14 2019-07-02 Fmr Llc Point-to-point transaction guidance apparatuses, methods and systems
US20170109735A1 (en) * 2015-07-14 2017-04-20 Fmr Llc Computationally Efficient Transfer Processing and Auditing Apparatuses, Methods and Systems
CN105404701B (en) * 2015-12-31 2018-11-13 浙江图讯科技股份有限公司 A kind of heterogeneous database synchronization method based on peer-to-peer network
US10522252B2 (en) * 2017-06-16 2019-12-31 Carefusion 303, Inc. Opioid management system
US10944546B2 (en) * 2017-07-07 2021-03-09 Microsoft Technology Licensing, Llc Blockchain object interface

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7724138B2 (en) * 1999-12-16 2010-05-25 Sirit Technologies Inc. Method and system for tracking clustered items
US20060106718A1 (en) * 2004-11-16 2006-05-18 Supplyscape Corporation Electronic chain of custody method and system
US20060235805A1 (en) * 2005-04-13 2006-10-19 Mr. Feng Peng Universal anti-counterfeit method and system
GB2429078A (en) * 2005-07-04 2007-02-14 Thierry Powis De Tenbossche Authentication system
WO2007056712A2 (en) * 2005-11-04 2007-05-18 Kestrel Wireless Inc. System and method for authenticating products
US8063736B2 (en) * 2007-03-27 2011-11-22 Valmarc Corporation Authentication of source, plus, for goods and services system, method, and components
US20090230190A1 (en) * 2008-03-17 2009-09-17 Philip Morris Usa Inc. Method and apparatus for identifying, authenticating, tracking and tracing manufactured items
US20110047183A1 (en) * 2009-08-24 2011-02-24 Helveta Limited Chain of custody monitoring and management
US20110154046A1 (en) * 2009-12-22 2011-06-23 Philip Morris Usa Inc. Method and apparatus for storage of data for manufactured items
US20130185217A1 (en) * 2010-10-27 2013-07-18 Michael Fiedler Feature specification for authentication feature
WO2014098610A1 (en) * 2012-12-21 2014-06-26 Kezzler As Method and system for storing and retrieving packaging relationships

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
PILKINGTON, MARC: "Blockchain Technology: Principles and Applications", RESEARCH HANDBOOK ON DIGITAL TRANSFORMATIONS, 24 September 2015 (2015-09-24), pages 225 - 253, XP009515602, ISBN: 9781784717759 *
See also references of EP3437062A4 *

Cited By (64)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11244378B2 (en) 2017-04-07 2022-02-08 BXB Digital Pty Limited Systems and methods for tracking promotions
US11663549B2 (en) 2017-05-02 2023-05-30 BXB Digital Pty Limited Systems and methods for facility matching and localization
US11507771B2 (en) 2017-05-02 2022-11-22 BXB Digital Pty Limited Systems and methods for pallet identification
US11900307B2 (en) 2017-05-05 2024-02-13 BXB Digital Pty Limited Placement of tracking devices on pallets
US10977460B2 (en) 2017-08-21 2021-04-13 BXB Digital Pty Limited Systems and methods for pallet tracking using hub and spoke architecture
US10956854B2 (en) 2017-10-20 2021-03-23 BXB Digital Pty Limited Systems and methods for tracking goods carriers
CN111971704B (en) * 2017-10-27 2024-04-19 Bxb数码私人有限公司 System and method for executing intelligent contracts using blockchain
CN111971704A (en) * 2017-10-27 2020-11-20 Bxb数码私人有限公司 System and method for executing intelligent contracts using blockchains
US10839345B2 (en) 2017-10-27 2020-11-17 BXB Digital Pty Limited Systems and methods for executing smart contracts using a block chain
WO2019083611A1 (en) * 2017-10-27 2019-05-02 BXB Digital Pty Limited Systems and methods for executing smart contracts using a block chain
US11722302B2 (en) 2017-11-02 2023-08-08 Nchain Licensing Ag Computer-implemented systems and methods for combining blockchain technology with digital twins
US11652634B2 (en) 2017-11-02 2023-05-16 Nchain Licensing Ag Computer-implemented systems and methods for linking a blockchain to a digital twin
US12081671B2 (en) 2017-11-02 2024-09-03 Nchain Licensing Ag Computer-implemented systems and methods for linking a blockchain to a digital twin
US12010233B2 (en) 2017-11-02 2024-06-11 Nchain Licensing Ag Computer-implemented systems and methods for combining blockchain technology with digital twins
WO2019152381A1 (en) * 2018-01-31 2019-08-08 Walmart Apollo, Llc System and method for digital currency via blockchain
WO2019149908A1 (en) * 2018-02-02 2019-08-08 Roche Diabetes Care Gmbh A method for controlling distribution of a product in a computer network and system
US11876894B2 (en) 2018-02-02 2024-01-16 Roche Diabetes Care, Inc. Method for controlling distribution of a product in a computer network and system
US11533166B2 (en) 2018-02-02 2022-12-20 Roche Diabetes Care, Inc. Method for controlling distribution of a product in a computer network and system
WO2019166119A1 (en) * 2018-02-27 2019-09-06 Siemens Aktiengesellschaft Method for a registration of usage of tracking data
EP3531353A1 (en) * 2018-02-27 2019-08-28 Siemens Aktiengesellschaft Method for a registration of usage of tracking data
US11587019B2 (en) 2018-02-27 2023-02-21 Siemens Aktiengesellschaft Method for a registration of usage of tracking data
WO2019168794A1 (en) * 2018-02-28 2019-09-06 Walmart Apollo, Llc System and method for verifying items using blockchain
US20190266612A1 (en) * 2018-02-28 2019-08-29 Walmart Apollo, Llc System and method for verifying products using blockchain
EP3540662A1 (en) * 2018-03-15 2019-09-18 Deutsche Telekom AG Computer implemented method for supply chain management and provenance in a data processing network
WO2019178644A1 (en) * 2018-03-21 2019-09-26 Tbsx3 Pty Ltd Item identification and tracking system and data access and governance system
EP3776403A4 (en) * 2018-03-28 2023-02-22 Konstantinos Bakalis Systems and methods for using codes and images within a blockchain
US10878429B2 (en) 2018-03-28 2020-12-29 Konstantinos Bakalis Systems and methods for using codes and images within a blockchain
US11836743B2 (en) 2018-03-28 2023-12-05 Konstantinos Bakalis Systems and methods for securing communication data and property using blockchain
WO2019190872A1 (en) 2018-03-28 2019-10-03 Konstantinos Bakalis Systems and methods for using codes and images within a blockchain
US11257098B2 (en) 2018-03-28 2022-02-22 Konstantinos Bakalis Systems and methods for securing communication data and property using blockchain
US10719884B2 (en) 2018-03-30 2020-07-21 Alibaba Group Holding Limited Blockchain-based service execution method and apparatus, and electronic device
US11049188B2 (en) 2018-03-30 2021-06-29 Advanced New Technologies Co., Ltd. Blockchain-based service execution method and apparatus, and electronic device
US11113769B2 (en) 2018-03-30 2021-09-07 Advanced New Technologies Co., Ltd. Blockchain-based service execution method and apparatus, and electronic device
US10834095B2 (en) 2018-05-17 2020-11-10 International Business Machines Corporation Post-commit validation in a distributed ledger
JP2020524827A (en) * 2018-05-29 2020-08-20 アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited Blockchain-based product billing method and apparatus, and electronic device
US11023981B2 (en) 2018-05-29 2021-06-01 Advanced New Technologies Co., Ltd. Blockchain-based commodity claim method and apparatus, and electronic device
WO2019231959A1 (en) 2018-05-29 2019-12-05 Alibaba Group Holding Limited Blockchain-based commodity claim method and apparatus, and electronic device
EP3602447A4 (en) * 2018-05-29 2020-03-11 Alibaba Group Holding Limited Blockchain-based commodity claim method and apparatus, and electronic device
AU2019204054B2 (en) * 2018-05-29 2020-09-10 Advanced New Technologies Co., Ltd. Blockchain-based commodity claim method and apparatus, and electronic device
AU2019204063B2 (en) * 2018-05-29 2020-11-26 Advanced New Technologies Co., Ltd. Blockchain-based merchandise tracing methods and apparatus
US10922757B2 (en) 2018-05-29 2021-02-16 Advanced New Technologies Co., Ltd. Blockchain-based commodity claim method and apparatus, and electronic device
AU2019204063C1 (en) * 2018-05-29 2021-05-13 Advanced New Technologies Co., Ltd. Blockchain-based merchandise tracing methods and apparatus
AU2019204054C1 (en) * 2018-05-29 2021-05-27 Advanced New Technologies Co., Ltd. Blockchain-based commodity claim method and apparatus, and electronic device
WO2020001996A1 (en) * 2018-06-26 2020-01-02 Bundesdruckerei Gmbh Protection against falsification and handover control of consumer goods
IT201800007031A1 (en) * 2018-07-09 2020-01-09 Giambattista Donelli METHOD FOR REGISTRATION ON PERMISSIONED BLOCKCHAIN OF THE PASSAGE OF TIMED DELIVERY OF ELECTRONICALLY LABELED PALLETS
US11488160B2 (en) 2018-07-30 2022-11-01 Hewlett Packard Enterprise Development Lp Systems and methods for using captured time series of secured representations of distributed ledger addresses and smart contract deployed on distributed ledger network to prove compliance
US11184175B2 (en) 2018-07-30 2021-11-23 Hewlett Packard Enterprise Development Lp Systems and methods for using secured representations of location and user distributed ledger addresses to prove user presence at a location and time
US11403674B2 (en) 2018-07-30 2022-08-02 Hewlett Packard Enterprise Development Lp Systems and methods for capturing time series dataset over time that includes secured representations of distributed ledger addresses
US11250466B2 (en) 2018-07-30 2022-02-15 Hewlett Packard Enterprise Development Lp Systems and methods for using secured representations of user, asset, and location distributed ledger addresses to prove user custody of assets at a location and time
US11356443B2 (en) 2018-07-30 2022-06-07 Hewlett Packard Enterprise Development Lp Systems and methods for associating a user claim proven using a distributed ledger identity with a centralized identity of the user
US11270403B2 (en) 2018-07-30 2022-03-08 Hewlett Packard Enterprise Development Lp Systems and methods of obtaining verifiable image of entity by embedding secured representation of entity's distributed ledger address in image
US11271908B2 (en) 2018-07-31 2022-03-08 Hewlett Packard Enterprise Development Lp Systems and methods for hiding identity of transacting party in distributed ledger transaction by hashing distributed ledger transaction ID using secured representation of distributed ledger address of transacting party as a key
US11488161B2 (en) 2018-07-31 2022-11-01 Hewlett Packard Enterprise Development Lp Systems and methods for providing transaction provenance of off-chain transactions using distributed ledger transactions with secured representations of distributed ledger addresses of transacting parties
US11233641B2 (en) 2018-07-31 2022-01-25 Hewlett Packard Enterprise Development Lp Systems and methods for using distributed attestation to verify claim of attestation holder
US10931438B2 (en) 2018-08-13 2021-02-23 International Business Machines Corporation Generating a representative article
EP3847597A4 (en) * 2018-09-04 2022-08-31 Huru Systems Ltd. Tracking code generation, application, and verification using blockchain technology
US11321544B2 (en) 2018-11-09 2022-05-03 Avery Dennison Retail Information Services Llc Fork chain product label and method of use
WO2020097432A1 (en) * 2018-11-09 2020-05-14 Avery Dennison Retail Information Services, Llc Fork chain product label and method of use
US11249169B2 (en) 2018-12-27 2022-02-15 Chep Technology Pty Limited Site matching for asset tracking
EP3915072A4 (en) * 2019-01-23 2022-10-05 Cellr Pty Ltd Beverage producer authenticity verification method and system
US11062256B2 (en) 2019-02-25 2021-07-13 BXB Digital Pty Limited Smart physical closure in supply chain
CN110634548A (en) * 2019-09-23 2019-12-31 重庆华医康道科技有限公司 Block chain-based dispensing and medicine checking fast matching method
CN110634548B (en) * 2019-09-23 2022-02-01 重庆华医康道科技有限公司 Block chain-based dispensing and medicine checking fast matching method
AT525150A1 (en) * 2021-06-01 2022-12-15 Schur Flexibles Digital Gesmbh PROCEDURES FOR VERIFIABLE DOCUMENTATION OF INFORMATION

Also Published As

Publication number Publication date
EP3437062C0 (en) 2023-06-21
WO2017165910A1 (en) 2017-10-05
EP3437062A1 (en) 2019-02-06
AU2022203457A1 (en) 2022-06-09
US11367039B2 (en) 2022-06-21
US20240265336A1 (en) 2024-08-08
US20220318744A1 (en) 2022-10-06
CN109478305A (en) 2019-03-15
US20190114584A1 (en) 2019-04-18
AU2017239933A1 (en) 2018-11-08
ES2956770T3 (en) 2023-12-27
US11900308B2 (en) 2024-02-13
EP3437062B1 (en) 2023-06-21
AU2020202384A1 (en) 2020-04-30
EP3437062A4 (en) 2019-08-14

Similar Documents

Publication Publication Date Title
US11900308B2 (en) Information system for item verification
Chang et al. Blockchain in global supply chains and cross border trade: a critical synthesis of the state-of-the-art, challenges and opportunities
CN108432176B (en) System and method for ensuring asset and supply chain integrity
US8714442B2 (en) System for and method of securing articles along a supply chain
US11682095B2 (en) Methods and apparatus for performing agricultural transactions
US20060106718A1 (en) Electronic chain of custody method and system
MXPA05013837A (en) Electronic security system for monitoring and recording activity and data relating to cargo.
US20110274275A1 (en) Trans-Security Components System and Methods
US11615374B2 (en) Provenance and illicit product control system
WO2019178644A1 (en) Item identification and tracking system and data access and governance system
US20230120636A1 (en) Item Identification and Tracking System and Data Access and Governance System
US9202194B1 (en) Tracking the distribution of a product or package through a supply chain to determine authenticity and detect breaches
Hulstijn et al. Integrity of supply chain visibility: Linking information to the physical world
AU2021101071A4 (en) Data science/ engineering in advanced supply chain process using block chain technology
Narassima et al. Blockchain-based seamless end-to-end shipping with android application
CN108596546A (en) Commodity management system for e-commerce
Inaba Inference of product quality by using RFID-enabled traceability information a study on the US pharmaceutical supply chain
Chudzik et al. FOOD SAFETY IN THE SUPPLY CHAIN: THEORY AND PRACTICE
AU2003262306B2 (en) Logistics Chain Management System
DAF Woodfield THE EMERGING IMPACTS OF BLOCKCHAIN TECHNOLOGY ON
Paul Curwell et al. Tag Archives: Anti-Diversion Program (ADP)

Legal Events

Date Code Title Description
DPE2 Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2017772867

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2017239933

Country of ref document: AU

Date of ref document: 20170331

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2017772867

Country of ref document: EP

Effective date: 20181031

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17772867

Country of ref document: EP

Kind code of ref document: A1