WO2019195903A1 - Método de rastreamento de produtos usando bases de registros distribuídos e compartilhados e números aleatórios gerados por processos quânticos - Google Patents
Método de rastreamento de produtos usando bases de registros distribuídos e compartilhados e números aleatórios gerados por processos quânticos Download PDFInfo
- Publication number
- WO2019195903A1 WO2019195903A1 PCT/BR2018/050097 BR2018050097W WO2019195903A1 WO 2019195903 A1 WO2019195903 A1 WO 2019195903A1 BR 2018050097 W BR2018050097 W BR 2018050097W WO 2019195903 A1 WO2019195903 A1 WO 2019195903A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- product
- system server
- code
- user
- alarm
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0639—Item locations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Lists, e.g. purchase orders, compilation or processing
- G06Q30/0635—Processing of requisition or of purchase orders
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Definitions
- the present invention relates to a method of tracking and verifying the authenticity and origin of products, goods and documents, while satisfying the precepts of inviolability, robustness and traceability.
- the consumer today has no tool capable of identifying the authenticity and origin of a product and therefore in some cases the consumption of counterfeit products reaches 30% of the total. Damage to businesses, consumers and the government itself is therefore reaching extremely high levels.
- a major problem in identifying cargo theft gangs is determining the location of dealers of these stolen products quickly, with a view to recovering and curbing such a crime.
- due to the scale of theft it becomes almost impossible for law enforcement to identify each stolen product. This is the case, for example, with stolen electronics, which are sold both on the street and on online sales without any supervision.
- the manufacturer has done little to use new technologies that allow the authentication of its products.
- U.S. Patent 6,442,276 B1 describes a method for verifying the authenticity of goods, which includes generating one or more random codes and storing those codes in a database.
- said patent has problems that may impair accurate code verification: (i) said patent uses computer-generated, that is, pseudorandom numbers, so that its randomness cannot be audited or even proven; (ii) there is no end user participation in the process of authentication; (iii) the system is not online, that is, a database update at one location cannot be immediately observed from another location; (iv) the system does not use the internet; (v) the authentication method relies solely on pseudorandom numbers and asymmetric encryption, not using additional sensors or location methods; (vi) the database is not guaranteed to be robust and may be tampered with by an unauthorized third party and thus compromising the entire integrity of the system; (vii) the system is unable to identify an event where an authentic code is used on a product or quite different from the original (such as a code originally produced for a cell phone to be used
- US 9,473,303 B2 in turn, describes a system that during the manufacture of a product creates an authentication code based on device-specific information related to the product.
- said patent has the following problems: (i) it uses an asymmetric encryption system, in which any private key leakage compromises the integrity of the system; (ii) the system is not bidirectional, that is, there is no information sent by the end user to the manufacturer; (iii) the system does not use any smartphone sensor or location method, so there is no guarantee that a good will be delivered to a particular geographic location; (iv) the system does not provide any protection against theft, ie the consumer has no means of verifying that he is purchasing a stolen product; (v) the system does not mention issuer validation and authentication and document content; (vi) the system has no guarantee of robustness, so any attack on the database by a third party will compromise the integrity of the system.
- US 2005/0234823 A1 describes a system for marking products for authentication, preventing surplus production and allowing product tracking.
- Said document uses a symmetric or asymmetric encryption system, in which any single / private key leakage compromises the integrity of the system;
- the system is not bidirectional, that is, there is no information sent by the end user to the manufacturer;
- the system does not use any smartphone sensor or location method, so there is no guarantee that a good will be delivered to a particular geographic location;
- the system does not provide for the creation of an account where the end user has access to their product certificates and their history;
- the system does not mention issuer validation and authentication and document content;
- the system has no guarantee of robustness, so any attack on the database by a third party will compromise the integrity of the system.
- U.S. Patent 8,566,598 B2 describes a method for producing an authenticable product by which a person or party other than the manufacturer of the product can determine that the product marked with a specific code is an authentic product.
- said patent involves an authority (third party) responsible for endorsements, which needs to be entrusted by the consumer;
- the system involves deterministic codes similar to serial numbers and can therefore be easily copied;
- the system does not mention issuer validation and authentication and document content;
- the system has no guarantee of robustness, so any attack on the database by a third party will compromise the integrity of the system.
- US patent application US 2016/0189169 A1 which describes a system that allows a mobile application to communicate with a product's database server to determine if the server has the correct product identifier, and a method that includes obtaining a product identifier, encrypting data associated with the obtained product identifier, and sending data to a database to determine if the database has the obtained product identifier.
- the security mechanism described in said document is based on asymmetric key encryption, which is already intrinsic to the blockchain;
- the system features only an asset traceability mechanism based on blockchain properties, which has performance limitations when applied to large scale products such as medicines and food; (iii) all commercial transactions of the goods are made using the blockchain digital currency.
- US 2006/0165260 A1 describes a method, system and apparatus for verifying the authenticity of a product.
- the invention described in said document is based on providing a card to the consumer and relies on a telephone call center to validate a unique identification number that is provided by the manufacturer.
- the main purpose of the present invention is to enable consumers via their smartphone to directly identify fake, tampered, stolen products or that contain any information provided by the manufacturer that prevents their sale (such as defects). contamination, shelf life, etc.), making it an active element of an integrated control system.
- a second object of the invention is to enable certification of ownership of a product, good or document, that is, to provide assurances that a certain good belongs to a certain individual, as well as to keep a record of all assets acquired by an individual and a history of all individuals who have already owned a particular good, thus generating a traceability chain of the product or good.
- the present invention also enables the authenticity of products and goods for purposes of content control and document authenticity, such as prescriptions, contracts, certificates, deeds, paper money, etc., to be realized. Notaries and central banks now solve part of this problem in an archaic and inefficient manner.
- the document may be validated and already used by a third party, such as a pharmacy or hospital, as it can only be used once.
- a method which is also capable of authenticating and validating a meeting between two or more mobile devices or between a mobile device and a fixed device.
- the method can authenticate the meeting between two people through their smartphones.
- dynamic codes are generated for one or both devices and the validation will be performed taking into account the time of reading of each code, as well as cross information from other geolocation sensors.
- the present invention aims to provide a tracking method that provides: (i) guarantees of randomness; (ii) auditability of the random code (number) generation process; (iii) submission of unlocking passwords for new products; (iv) creation of dynamic codes sent to a particular smartphone to prove the location and / or encounter between two individuals or between an individual and a device; (v) sending manufacturer information to the end consumer, such as recall notices, maintenance, upgrades, or any other relevant information.
- the present invention aims to transform the end user into an authentication terminal via a preferably mobile device such as a smartphone or a tablet.
- a code printed on the product by the manufacturer, is read by the device's camera and transmitted to a server, which is responsible for authenticating the code.
- Codes are generated in a proven, random manner through quantum phenomena in a plant, and acquired by the manufacturer, who in turn will uniquely associate each code with a product.
- Each process step is recorded in a centralized database which periodically generates a hash that in turn feeds a blockchain.
- the practical impossibility of tampering with data in the blockchain translates into the impossibility of tampering with the database. centralized.
- the method simultaneously acquires the following properties: uniqueness, randomness, irreversibility, inviolability, non-reproducibility, auditability, perennity, traceability and reliability.
- Each of these properties can be set as follows.
- the generated code is made up of two parts: a sequentially generated first part and a randomly generated second part. Therefore, each number will be unique per building.
- Randomness The second part of each code is guaranteed and proven to be randomly generated through a quantum process. Randomness is guaranteed by the laws of physics. Due to the development of conventional and quantum computation, encryption methods and random code / number generation that do not depart from seeds or classical algorithms are necessary, as these can be broken, mainly by quantum algorithms.
- Tamper Evidence The database that has the code information is tamper proof against tampering attempts, which is guaranteed by the blockchain system.
- Auditability At any time, the code generation process can be audited by the customer who will use them in their products. This customer is given a guarantee of randomness of numbers, that is, a guarantee that those numbers were actually generated randomly and not obtained by other means or numerical algorithms. Perpetuity: Information on codes in circulation, including those already in use, will be kept on a permanent basis, ie no loss of information on codes already produced. This feature is guaranteed by the use of blockchain system for data storage.
- Traceability The system stores information that is updated in each of the intermediate instances of the distribution chain: manufacturer / importer, distributor, point of sale, end consumer and all carriers involved in any of these segments. All this movement is associated with the individual code of each product and / or the product batch to which it belongs. From this data, the consumer can query the origin of their product and confirm if the product was obtained at the originally designated place. This prevents a product from having its code replicated even once and from being marketed in another establishment outside the original registered chair. Traceability may also serve as a certificate of authenticity of a product, including for resale purposes.
- the presented solution can also be applied to documents, in order to guarantee the authenticity of its issuer, receiver and content.
- the present invention provides that a code is dynamically generated, so that its reading associated with a timestamp acts as a guarantee of the presence of a device in a certain location.
- Figure 1 is a general flowchart of the product code generation and association process, the product inquiry process, and the product acquisition process that form the product tracking method proposed by the present invention
- FIG. 2 is a block diagram of the components involved in the present invention.
- Figure 3 - a graphical representation of the final code
- FIG. 4 - a flowchart of the first subprocess shown in Figure 1;
- FIG. 5 - a flowchart of the second subprocess shown in Figure 1;
- FIG. 6 - a flowchart of the third subprocess shown in Figure 1;
- Figure 7 A flowchart of the process of transferring ownership of one or more products from a seller to a buyer;
- FIG 8 is a flowchart of the fourth subprocess shown in Figure 1;
- Figure 9 is a flow diagram of the product tracking method of the present invention.
- Figure 10 - a flowchart of the match validation process
- FIG. 11 - a flowchart of the ownership transfer process
- Figure 12 - a flow diagram of the product tracking method when the product is lost
- Figure 13 is a block diagram of an example application of the product tracking method of the present invention for prescription authentication.
- Figure 14 - A flow diagram of the example of Figure 13.
- One embodiment of the present invention is comprised of a product tracking macroprocess, which comprises a product code generation and association process 100 and a product acquisition process 200, both shown in Figure 1.
- a match validation process 300 is provided, as shown in Figure 10.
- Figure 2 illustrates the components involved in the screening method provided by the present invention.
- Such components, or system agents are: client 10, system server 21, centralized database 22, blockchain 23, random number generation system 24, distributor 30, point of sale (vendor) ) 40, user 50 (provided with validation equipment 51 with validation software 52), and physical code 60 (or Container code 61).
- Customer 10 is defined as the person, natural or legal, responsible for the manufacture, development or importation of products to be verified, authenticated and / or tracked.
- System server 21 is defined as a computer or computer network responsible for the exchange of information between client 10, centralized database 22, random number generation system 24, distributor 30, vendor 40 and user 50
- Centralized database 22 is defined as an indexed data structure responsible for information storage and reporting involving this information.
- Blockchain 23 is defined as a data structure based on blockchain technology.
- Random number generation system 24 is defined as a physical apparatus responsible for the generation and validation of random numbers based on a fundamental physical principle.
- Distributor 30 is defined as one or more intermediary agents between customer 10 and seller 40.
- “Seller” 40 is defined as a natural or legal person responsible for the sale of products containing the codes generated by the system.
- User 50 is defined as an individual with validation equipment 51. Each user 50 is assigned a unique identification number which is used to distinguish one user from another. This unique identification number can be obtained in a variety of ways, such as private keys, username and password, mobile phone number, or any other existing user authentication system.
- Validation equipment 51 is defined as a smartphone, tablet or any other type of device or equipment capable of connecting to the Internet, capable of reading bar code, QR code or DATAMATRIX code, or any other one-way or two-dimensional codes, capable of sending your geolocation via GPS or any other geolocation technology, having a screen or any other means of interaction with user 50, distributor 30 or seller 40 and having the 52 validation app installed.
- validation equipment 51 used by distributor 30, seller 40 or user 50, in their respective stage of the process.
- This information obtained from validation equipment 51 may use GPS data, triangulation of cellular antennas or any other methods that indicate the location the highest level of accuracy available.
- the match validation process 300 may be used to obtain geographic location data.
- Validation application 52 is defined as software developed for device platforms with validation equipment characteristics 51 capable of communicating with system server 21 in order to send and receive data specific to each user. 50 related to each physical code 60.
- Physical code 60 is defined as any physical, visual, electromagnetic or any other form of communication capable of representing the codes that will be transmitted to user validation equipment 51.
- the physical code 60 can be a QR code, DATAMATRIX code, barcode, RFID representation, among others.
- Container 61 is defined as an aggregate physical code that refers to a set of individual physical codes 60.
- FIG. 1 shows the interconnected processes 100, 200.
- Process 100 herein referred to as the method of generating and associating codes with products, is initiated by a request 101 from a sequence number block by a customer 10 which may consist, for example, of a manufacturer, importer, a notary or professional, among others, interested in obtaining codes for their products.
- a system server 21 generates 102 a binary sequential number block and stores it 103 in a centralized database 22, associating said sequential number block with client 10. It is crucial, however, that the numbers sequential unique and there is a two-way correspondence between each sequential number and each product.
- client 10 may request 104 at any time to generate random numbers to be associated with each sequential number determined by it.
- the codes associated with each sequential number determined by client 10 are generated and authenticated. It is noteworthy that not all block sequential numbers acquired by client 10 need to be associated with random numbers at the same time.
- N is the number of codes requested by client 10.
- Each random number is made up of M bits, where M is chosen so that it is greater than or equal to the number of bits of the previously generated sequence numbers 102.
- Generation 105 of random numbers by the number generation system 24 utilizes a physical process for which randomness is an intrinsic property of the process, based on the laws of physics, involving the use of entangled particle pairs or any other quantum processes that can allow auditing of its randomness.
- maximally entangled photon pairs can be used at a certain degree of freedom, such as their polarization, and whose detection process involves the violation of a Bell Inequality, thus ensuring an audit process of the obtained randomness.
- Each random number generated is associated with its respective sequential number, previously generated upon client request 10.
- the combination of the sequential number and the Random number makes up a code 60 that is stored in database 22.
- customer 10 can, at any time, associate 106 between product identification numbers - product serial numbers, manufacturing batch numbers, or any other numbers. that identify or classify your products - with stored codes 60.
- System server 21 then stores 107 associations of codes 60 to products in database 22.
- a hash from database 22 is generated and inserted 108 into a blockchain 23 associated with client 10.
- the hash function used must be suitable for encryption processes, ie its output must have a fixed number of alphanumeric characters regardless of the size of the input, the likelihood of collision must be negligible and it must be computationally impracticable to obtain the original data from hash knowledge.
- Some examples of hash functions that can be used are SHA1 -SHA5, MD5, BLAKE / BLAKE2, among others.
- Customer Product Identification Numbers 10 may contain product information such as shelf life, batch, product type, content (for documents), etc. For products that are not uniquely identified - through, for example, serial numbers - such as food or some types of medicine, the manufacturing batch number of the products may be used instead of the serial number of the products. from the client 10.
- serial number of client products 10 has nothing to do with the sequential number 102 generated by system server 21.
- customer 10 then performs a process of printing a physical representation of code 60 that can be read by a validation device. 51 of distributor 30, seller 40 and / or user 50.
- QR Code or Datamatrix formats, or any other representation capable of storing an extended code may be used.
- customer 10 may initiate a process of associating a code group with a single code, called Container code 61.
- This Container code 61 will have associated with you in database 22 all product codes chosen by customer 10.
- client 10 initiates a process for printing container codes 61.
- This process results in a physical representation of Container code 61.
- other physical representation technologies may be employed for writing and reading Container code 61 such as RFID, single bar codes, USB memories, etc.
- the graphic representation format of the final code 60 or Container code 61 should contain the following information: the system generated code (sequence number + random number) and the UPC code (Universal Product Code) for product recognition, acting as customer's product identification number 10. This can be seen in Figure 3.
- the presence of the UPC code within the graphical representation will allow a single scan that contains all the information necessary for the full operation of the system. just like the systems used by all vendors that use the UPC code for their selling controls.
- process 200 is initiated as shown in Figure 1.
- Process 200 is initiated by subprocess 201, which is shown in detail in Figure 4, and described below.
- Distributor 30 receives a notification from system server 21 that a product load has been sent 201 to distributor 30 by customer 10.
- the distributor 30 does not receive the charge on the date indicated by the system, or receives notification of an event of loss or theft by any means, the loss or theft is notified to customer 10.
- customer 10 prompts system server 21 to block 201 j from codes associated with misplaced products, which immediately updates centralized database 22 with lock information (a "locked" status is generated).
- lock information a "locked" status is generated.
- distributor 30 If products reach distributor 30, that is, if there is no loss of products, distributor 30 reads physical codes 60, 61 using a validation device 51. If the code of any product or batch invalid, an alarm is sent 201 and, by system server 21, to client 10 indicating possible fraud.
- product identification information such as a photo thereof
- an alarm is sent 201 g by system server 21 to client 10 indicating geolocation data. Additionally, if some other relevant information is obtained, such as a photo of the product, it will be sent to the customer 201 h 10.
- the system updates 201 ba current product location or product batch in database 22, using, for example, validation equipment geolocation mechanisms 51.
- Distributor 30 then sends 201 c the products to the seller 40.
- a product If a product is not lost, the seller 40 receives them and checks the validity of physical codes 60, 61 through a validation device 51. If the code of any product or batch of products is invalid, an alarm is sent. 201 and, by system server 21, to client 10 indicating possible fraud. System server 21, through validation application 52, requests 201 f from seller 40 for additional product identification information, such as a picture of the product, to be sent to system server 21. In the case of product identification, a The alarm is sent 201 g by system server 21 to client 10 indicating geolocation data. Additionally, if some other relevant information is obtained, such as a product photo, these are sent 201 h to customer 10.
- any attempt to sell the fraudulent products will be detected by the validation application 52 whenever a user 50 queries the code of a fraudulent product using a validation equipment 51.
- the system updates 201 d the location of the products in database 22 and the seller 40 can thus store the product so that its sale to the consumer is viable.
- a hash of database 22 is generated 205 and inserted into the blockchain associated with client 10. Hash generation is done asynchronously from time to time. If a user 50 is interested in the product and decides to query its physical code 206 using its validation equipment 51, the code is sent to system server 21 which in turn queries database 22 for authenticity. of code 60.
- subprocess 202 the system checks whether customer's own numbering 10 for a product or product batch - serial number, batch number, and more - is valid. If so, an alarm is sent by system server 211a to both client 10 and user 50 indicating possible fraud. For client 10, 202b geolocation data from user 50 is still sent.
- 202c is sent by system server 21, an alarm to user 50 to indicate possible fraud.
- product identification information such as a description of the product or its UPC code
- user 50 provides the product ID
- an alarm is sent 202e to customer 10 indicating the geolocation of user 50.
- User 50 may also provide other information, such as a photo of the product to the customer if desired.
- Product identification information is sent 202f by system server 21 to client 10. Identification of the possibly fake product and its association with the likely manufacturer will be made by the application through image recognition, UPC code or any other means. that can identify a product. If the application / system recognizes the product and is part of products that use the code system described here, the alarm can be sent automatically.
- Subprocess 203 verifies that, in addition to the code validity information, system server 21 also returns to user 50 a "special event", or additional alarm, as well as what this special event is.
- a special event is the identification and dispatching of an additional alarm to user 50 containing information about the product 203h, where the additional alarm is one of: stolen product alert 203a, code belonging to product already sold (product 203b, copied code (fake product) 203c, unavailable product for sale 203d, unusable product 203e, geographically restricted product 203f, and more.
- the special event is also sent 203h to customer 10 in conjunction with sending 203i from user identification data 50 and user geolocation information / product 50.
- Stolen product code 203a means a code which, in any part of the transport chain between customer 10 and seller 40, has occurred a theft communication to customer 10 which in turn reports to the system that their codes should be blocked - by changing the product status in database 22 - due to theft.
- the code belonging to a product already sold / used 203b is one that, in database 22, is identified as a code associated with a product already purchased in the past and reported to the system by any user, so that The product status associated with this code is marked “used” in database 22.
- the copied code 203c is code that has been queried multiple times and identified as a product already sold or consulted in different geographical locations by different users.
- the definition to consider copied code may conform to certain predefined query patterns in the system.
- Product unavailable for sale 203d is any product containing a code with this information, provided by customer 10, and present in database 22.
- Disused product 203e is any product containing a code which in database 22 is a product which has been disposed of or is considered unfit for consumption.
- customer 10 may recall or suspend sale of products identified as unfit for consumption, and immediately block sale to consumers in situations such as identifying food contamination, car safety device failures, manufacturing defects already identified by the manufacturer, etc.
- the geographic sales restriction 203f is information provided by customer 10 and associated with product codes that specifies a geographical area in which the sale is permitted. For example, products for export that cannot be traded in the national territory by law, various regulations, tax reasons, among others.
- code query is valid and there is no special event, ie subprocess 203 returns no event, user data 50 is sent 207 by validation equipment 51 to the system server. 21 and stored in database 22 together with date, time and geolocation data of user 50. In addition, 207 to the user 50 data information on product content, if any, is also sent. Product query information is then sent to customer 10 and user identification data 50, date, time and geolocation of the product are updated to database 22.
- the user after receiving the information about the product content and performing his own validation, has the option to request purchase of the product.
- user 50 confirms to system server 21 that he is purchasing the product, this information being stored in database 22 together with date, time, and data. geolocation of the user 50. From that moment on, a “pending acquisition” status is generated by system server 21 and the product code is marked in database 22 with this status.
- Figure 7 shows the steps of transferring ownership of multiple products from one seller to one buyer.
- system server 21 After completing the steps of associating 212 by system server 21, product code 60 with user 50, and changing product status 212 to “locked” to database 22, system server 21 checks if an “additional action” occurs. If so, subprocess 204, shown in Figure 8 and described below, is initiated.
- Subprocess 204 identifies, in database 22, which additional action the purchased product needs.
- An additional action can be one of: submitting pass 204a, submitting certificate of guarantee or ownership 204b, sending coupon / discount 204c, credit upload 204d, unlocking services 204e, among others.
- Both user 50 and client 10 receive 204f the appropriate information corresponding to each action. Upon receiving such information, client 10 initiates a process for performing said action.
- Passcode 204a is defined as sending to user 50 an alphanumeric sequence, in any physical representation, that allows the user to fully use the purchased product. For example, a television or smartphone that requires a password for its initial activation and full operation.
- Submitting a Certificate of Warranty or Ownership 204b is defined as sending you 50 of a document that certifies ownership of the product with its respective warranty terms.
- Coupon / discount submission 204c is defined as sending an alphanumeric code that allows customer 50 to obtain some benefit. For example, a discount coupon on the purchase of other products, frequent flyer miles, rebates, and more.
- Credit upload 204d is the sending of an alphanumeric code that allows the user to purchase products on certain systems, such as downloading music, software, movies, games, etc., or tweaking on pre-owned mobile phones. paid.
- Unlocking services 204e is the sending of an alphanumeric code that allows the use of any type of service, such as after sales, insurance, technical assistance, support, among others.
- Database 22 is updated with all relevant information including an association between product and user 50 and conditions of sale data, especially date, time and geolocation. . From that moment on, it becomes apparent in the system that user 50 is the rightful owner of the purchased product. Thus, the system now contains an inventory of all purchased products and their respective owners.
- User 50 may also choose not to purchase the product.
- the product code remains available in the system for future purchases, but the code lookup event is stored in database 22.
- a hash of database 22 is generated 213 and inserted into blockchain 23 associated with client 10, as previously described.
- Figure 9 shows an example of the flow of information exchanged between the various agents (client 10, system server 21, distributor 30, vendor 40 and user 50) of the product tracking method proposed by the present invention.
- system server 21 may choose to use the functionality of the date validation process 300, as shown in detail in Figure 10.
- a sender 301 and a recipient 302 are required, each possessing equipment with an internet connection. Both devices must have a display or display device, such as smartphones, monitors, or televisions.
- System server 21 sends a set of codes to sender 301, which displays them on your machine screen as QR Codes in a random sequence.
- Recipient 302 reads QR Codes from the sender's equipment screen 301 in succession and assigns each one a timestamp containing the exact time as accurately as possible.
- validation equipment 51 in which each reading was performed.
- recipient 302 sends to system server 21 each code read with its respective time stamp. From the analysis of the compatibility between each code and its respective timestamp, the system is able to verify whether the encounter between sender 301 and recipient 302 devices actually occurred.
- Figure 11 shows a process 400 of selling and transferring ownership of a product.
- user 50 may choose to sell it as a used product.
- the product owner user acts as a seller user 53 and the buyer user as user 50.
- salesperson 53 reports 401 to system server 21 through validation application 52 which will place a particular product from its inventory for sale.
- the system updates the product status, and authorizes the disclosure of all product data, such as date of purchase, previous owners, place of purchase, warranty certificates (if any),
- the associated code the product is unlocked (status changed to allow sale) and database 22 is updated 403.
- the system transmits 405, through validation application 52, all product information for user 50.
- Buyer 50 based on the information received, decides whether to make a purchase requisition or not. If so, the system transmits 406 to the seller user 53, the purchase order.
- seller 53 accepts or does not accept the purchase requisition received, based on direct negotiation between the parties involved. If the purchase is authorized, the system updates the product status 407 with the new owner, transferring ownership from user seller 53 to buyer user 50. Finally, the system passes 408 change information to both users.
- the screening method of the present invention may be applied, for example, to a drug importer wishing to trace the entire distribution chain of one of its products.
- the importer requests one million random numbers and, together with the same number of serial numbers, generates a printed code in the form of a QR Code for each of one million packages of his product.
- Half of this quantity is sent to two distributors, A and B, and products shipped to each of the distributors are grouped into a single container.
- Distributor A receives his Container of five hundred thousand products, he uses the app on his smartphone to scan the Container QR Code. In response, he gets the information that the code is legitimate and the importer also gets the information that the Container has been correctly received by distributor A. [000141] Distributor A then undoes the Container and ships the products to hundreds of pharmacies. A consumer at one of these drugstores eventually performs a QR Code check printed on the drug packaging. The system query returns information that the drug is legitimate; In addition, the importer gets the information that one of his medicines was scanned by a user right at that pharmacy that day and time. If the consumer decides to purchase the drug, the code associated with it will be blocked and the importer will also be notified of the event.
- a cargo theft gang intercepts the truck carrying units intended for distributor B. Once aware of the event, distributor B accesses the system and disables (blocks) the container code that was intended to him, thus signaling that the cargo was stolen. Eventually, in a drugstore in another corner of the country, a consumer scans the QR Code of one of the stolen products. The system readily identifies that this code belonged to the container that was stolen and therefore the consumer receives the information via the smartphone app that it is a stolen drug.
- a C1 consumer purchases a TV1 TV set at an appliance store. Before making a purchase, the consumer uses the system application on their smartphone to check the TV1 QR code. The system returns the information that the product is genuine and that the It is even available for sale. Once the purchase is made, which is confirmed in the system by the store, the consumer C1 receives, in his application, an alphanumeric sequence, hereinafter referred to as "passwords", which will be required to unlock the product.
- the alphanumeric sequence that makes up the password will be randomly generated, for example, using the same process of generating the random component of the codes.
- an indication will appear on the screen: “Enter password”.
- consumer C1 types it and unlocking the TV1 TV so that he can use it normally.
- a physician 500 requests one or more sequential numbers from system 21 for the purpose of document validation - in the case of prescriptions 501.
- Doctor 500 requests the association of random numbers to their sequential numbers.
- the doctor 500 selects a particular code and associates it with a document 501, transmitting it to the system.
- This 501 document can be a scan of a physical document or a document produced directly on your computer or on the system itself.
- additional information such as patient name, prescription validity, and so on may also be transmitted to the system.
- Doctor 500 physically delivers the paper 501 prescription to his patient 502, containing the associated code in QR Code format. Patient 502 then checks their contents and then goes to pharmacy 503 to purchase the prescription drugs.
- pharmacy 503 Upon receipt of prescription 501 from patient 502, pharmacy 503 consults the QR Code printed on document 501 and, using the system 21 application, compares it to the content reported by system 21. In addition, pharmacy 503 receives the information regarding the prescribing physician 500, such as that the prescription 501 has never been used, is intended for the purchaser and is valid, among others. If all information received is considered relevant, pharmacy 503 proceeds with the sale of the medication to the patient.
- the sale is then reported to system 21 so that doctor 500 and patient 502 receive, in their respective applications, information that the sale has taken place. Additionally, the Pharmaceutical laboratory manufacturer of the drug (or its importer) also receives a notification of sale.
- a legitimate owner of a Swiss watch purchased some years ago and previously registered in that system, decides to put the watch for sale. For this, he first accesses the system and informs that the code associated with his watch is now unlocked, and thus allows the sending of information about the entire history of the watch since its manufacture. Then anyone interested in purchasing the product can scan their QR Code using the system application installed on their smartphone and verify the information that is transmitted by the system to the potential buyer.
- the system transmits to the owner of the watch a request for transfer of ownership (purchase). If the watch owner confirms the financial transaction for the sale of the watch, the system updates the status of the watch in which the new owner will now appear. Then a confirmation message is sent to both parties.
- a C consumer purchases a new vehicle from a dealership.
- the manufacturer discovers a serious one-piece defect on all vehicles. manufactured in a certain period of time, which includes the vehicle purchased by the consumer C. At this time, the manufacturer decides to make a recurrence to repair the defect.
- the manufacturer updates in the system the status of all vehicles affected by the defect.
- customer C receives a notification through his application on his smartphone, informing him of the need to show up with his vehicle to a dealer for replacement of the defective part.
- This example illustrates the importance of the manufacturer having a direct communication channel with the consumer.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Economics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/BR2018/050097 WO2019195903A1 (pt) | 2018-04-10 | 2018-04-10 | Método de rastreamento de produtos usando bases de registros distribuídos e compartilhados e números aleatórios gerados por processos quânticos |
US17/047,322 US11810179B2 (en) | 2018-04-10 | 2018-04-10 | Method for tracking products using distributed, shared registration bases and random numbers generated by quantum processes |
BR112020020986-4A BR112020020986A2 (pt) | 2018-04-10 | 2018-04-10 | Método de rastreamento de produtos usando bases de registros distribuídos e compartilhados e números aleatórios gerados por processos quânticos |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/BR2018/050097 WO2019195903A1 (pt) | 2018-04-10 | 2018-04-10 | Método de rastreamento de produtos usando bases de registros distribuídos e compartilhados e números aleatórios gerados por processos quânticos |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019195903A1 true WO2019195903A1 (pt) | 2019-10-17 |
Family
ID=68163393
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/BR2018/050097 WO2019195903A1 (pt) | 2018-04-10 | 2018-04-10 | Método de rastreamento de produtos usando bases de registros distribuídos e compartilhados e números aleatórios gerados por processos quânticos |
Country Status (3)
Country | Link |
---|---|
US (1) | US11810179B2 (pt) |
BR (1) | BR112020020986A2 (pt) |
WO (1) | WO2019195903A1 (pt) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021081803A1 (zh) * | 2019-10-30 | 2021-05-06 | 深圳市网心科技有限公司 | 区块链系统及监管方法、系统、装置、计算机存储介质 |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11900306B2 (en) * | 2017-07-05 | 2024-02-13 | United Parcel Service Of America, Inc. | Verifiable parcel distributed ledger shipping and tracking system |
US11922363B2 (en) | 2017-07-05 | 2024-03-05 | United Parcel Service Of America, Inc. | Counterparty physical proximity verification for digital asset transfers |
US11770257B1 (en) * | 2020-02-07 | 2023-09-26 | Research Blocks Technologies, Inc. | Blockchain incorporated system for verifying ingredients in agricultural products and byproducts |
CN116629903B (zh) * | 2023-07-19 | 2023-09-15 | 南京广播电视集团有限责任公司 | 一种基于区块链数据的商品防伪物联网溯源识别系统 |
CN117875990B (zh) * | 2024-03-13 | 2024-05-28 | 贵州省畜牧兽医研究所 | 一种基于区块链的蜂蜜追溯方法及系统 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130024387A1 (en) * | 2011-07-20 | 2013-01-24 | Verify Brand Llc | Systems and Methods for Tracking Assigned Code Strings |
US20150278805A1 (en) * | 2012-10-01 | 2015-10-01 | Acuity Systems, Inc. | Authentication system |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IL37456A (en) | 1971-08-05 | 1975-10-15 | Elscint Ltd | Method and means for numbering and/or ascertaining the authenticity of serially numbered objects |
US6442276B1 (en) | 1997-07-21 | 2002-08-27 | Assure Systems, Inc. | Verification of authenticity of goods by use of random numbers |
US7752137B2 (en) | 2003-11-03 | 2010-07-06 | Meyers Printing Company | Authentication and tracking system |
US20050234823A1 (en) | 2004-04-20 | 2005-10-20 | Rainer Schimpf | Systems and methods to prevent products from counterfeiting and surplus production also of tracking their way of distribution. |
US20060165260A1 (en) | 2005-01-21 | 2006-07-27 | Vanjani Govind W | Product authenticity validation system |
US8566598B2 (en) | 2005-09-02 | 2013-10-22 | Goodman Consulting Group | Method for article authentication using an article's authentication code and a second code provided by the party requesting authentication |
US20130227653A1 (en) * | 2008-11-29 | 2013-08-29 | Yu Yung Choi | System and method for streamlined registration of products over a communication network and for verification and management of information related thereto |
KR101226316B1 (ko) * | 2012-01-27 | 2013-02-01 | 정해탁 | 잠금장치가 장착된 제품의 제품고유번호 확인을 통한 진품여부 확인 및 정보 유출시 신규 데이터베이스 생성 및 잠금해정번호의 갱신이 가능한 진품여부 확인 시스템과, 잠금해정번호 획득을 통한 진품 여부 확인 방법 |
US9473303B2 (en) | 2013-05-23 | 2016-10-18 | Rosemount Inc. | Method and system for product authentication |
US20180094953A1 (en) * | 2016-10-01 | 2018-04-05 | Shay C. Colson | Distributed Manufacturing |
US20170032382A1 (en) * | 2014-04-14 | 2017-02-02 | Jenda Tag, LLC | System and Method for Product Authentication |
US10437435B2 (en) * | 2014-11-21 | 2019-10-08 | Deliveright Logistics, Inc | Delivery management systems and methods for zero-inventory distribution |
US20160189169A1 (en) | 2014-12-31 | 2016-06-30 | Salim Shah | System and Method for Detecting Counterfeit Products |
US20160217436A1 (en) * | 2015-01-25 | 2016-07-28 | Dror Samuel Brama | Method, System and Program Product for Tracking and Securing Transactions of Authenticated Items over Block Chain Systems. |
US20160321677A1 (en) * | 2015-05-01 | 2016-11-03 | Patrick Dobaj | Methods and systems for product authenticity verification |
US10402792B2 (en) | 2015-08-13 | 2019-09-03 | The Toronto-Dominion Bank | Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers |
US10558979B2 (en) * | 2016-01-20 | 2020-02-11 | Zortag, Inc. | Method of, and system for, preventing unauthorized products from being sold on online sites |
US20180108024A1 (en) * | 2016-06-03 | 2018-04-19 | Chronicled, Inc | Open registry for provenance and tracking of goods in the supply chain |
WO2018112381A1 (en) * | 2016-12-15 | 2018-06-21 | Matrics2, Inc. | PRODUCT DATA INTERFACE THROUGH A PERSONAL ASSISTANCE SOFTWARE AGENT USING RANDOM NUMBER IDENTIFIERS (RNIDs) |
-
2018
- 2018-04-10 WO PCT/BR2018/050097 patent/WO2019195903A1/pt active Application Filing
- 2018-04-10 BR BR112020020986-4A patent/BR112020020986A2/pt active Search and Examination
- 2018-04-10 US US17/047,322 patent/US11810179B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130024387A1 (en) * | 2011-07-20 | 2013-01-24 | Verify Brand Llc | Systems and Methods for Tracking Assigned Code Strings |
US20150278805A1 (en) * | 2012-10-01 | 2015-10-01 | Acuity Systems, Inc. | Authentication system |
Non-Patent Citations (2)
Title |
---|
"What is the Q in QRNG?", RANDOM NUMBER GENERATION WHITE PAPER, 5 February 2019 (2019-02-05), Retrieved from the Internet <URL:https://technodocbox.com/Computer_Peripherals/78526593-What-is-the-q-in-qrng.html> * |
HARRISON, G.: "Sealing MongoDB Data on the Blockchain", 2 January 2018 (2018-01-02), Retrieved from the Internet <URL:https://dzone.com/articles/sealing-mongodb-data-on-the-blockchain> [retrieved on 20190131] * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021081803A1 (zh) * | 2019-10-30 | 2021-05-06 | 深圳市网心科技有限公司 | 区块链系统及监管方法、系统、装置、计算机存储介质 |
Also Published As
Publication number | Publication date |
---|---|
US11810179B2 (en) | 2023-11-07 |
US20210272184A1 (en) | 2021-09-02 |
BR112020020986A2 (pt) | 2021-01-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019195903A1 (pt) | Método de rastreamento de produtos usando bases de registros distribuídos e compartilhados e números aleatórios gerados por processos quânticos | |
US20100033300A1 (en) | Apparatus, systems and methods for authentication of objects having multiple components | |
JP5319621B2 (ja) | 製品の偽造、横流しおよび海賊行為を防止する方法およびシステム | |
US7752137B2 (en) | Authentication and tracking system | |
CN107341676A (zh) | 防伪溯源标识和方法 | |
CA2891446C (en) | Digitally secured electronic titles for products in supply chains | |
JP2022514784A (ja) | 物体認証を準備及び実行するための方法及びシステム | |
US20140095398A1 (en) | Double ID Anti-Counterfeit Method and System | |
US20060010503A1 (en) | Product authentication system for preventing distribution of counterfeits in market | |
US20080011841A1 (en) | System and Method of Detecting Product Code Duplication and Product Diversion | |
US20100313037A1 (en) | Collectible case authentication system, device and method | |
CN103493460A (zh) | 借助于终端来认证实体的方法和系统 | |
CN102930307A (zh) | 一种名酒防伪认证方法 | |
JP2009531251A (ja) | 物品情報の取得 | |
KR20210158271A (ko) | 블록체인과 정품인증 태그 기술을 사용한 제품 진위성 검증 및 소유권 변경이력관리 시스템 | |
US10803374B2 (en) | Counterfeit prevention | |
JP2018528732A (ja) | 偽造防止 | |
US20220164805A1 (en) | Tagging of an object | |
KR20080051779A (ko) | Rfid 서명 태그를 이용한 제품 인증 및 서비스제공자확인 시스템 및 그 방법 | |
US20200242439A1 (en) | Counterfeit prevention | |
GB2495480A (en) | Product authentication using unique code | |
US20240193656A1 (en) | Marketplace for physical assets linked with digital assets | |
CN118365338A (zh) | 一种基于大数据的商务防伪交易方法及系统 | |
US20190377919A1 (en) | Unique identification code system for entity verification | |
Balinsky et al. | Anti-counterfeiting using memory spots |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18914201 Country of ref document: EP Kind code of ref document: A1 |
|
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112020020986 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 112020020986 Country of ref document: BR Kind code of ref document: A2 Effective date: 20201013 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18914201 Country of ref document: EP Kind code of ref document: A1 |