Sign In to Follow Application
View All Documents & Correspondence

Fake Product Detection System Using Blockchain And Iot Technology

Abstract: FAKE PRODUCT DETECTION SYSTEM USING BLOCKCHAIN AND IOT TECHNOLOGY Disclosed herein a Fake Product Detection System Using Blockchain And Iot Technology Comprises Controlling Unit (101), RFID Tags (102), Bar Code Scanner (104), Temperature & Humidity Sensor (105), GPS (106), Chemical Or Material Analyze Sensor (107), Light Sensor (108), Weight Sensor (109), Accelerometers (110), Gas Sensor (111), Magnetic Field Sensor (112) Pressure Sensor (113), Image Sensor (114), Battery (115) Controlling Unit (101), Cloud Server (107), and Web App (108). The controlling unit (101) is in charge of overseeing the entire operation of the bogus product detecting system; and it is in charge of the deployment, setup, and upkeep of IoT devices, the blockchain network, and the accompanying software applications It is in charge of collecting, storing, and analyzing data generated by IoT devices; which guarantees that data is delivered securely to the blockchain network for verification and storage. The system involves putting in place data encryption, access limits, and backup plans, RFID tags (102) RFID tags carry electronically recorded data that reads wirelessly by RFID readers; and said tags, which give unique identifying codes, can be added to objects or packaging.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
21 October 2023
Publication Number
47/2023
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

UTTARANCHAL UNIVERSITY
ARCADIA GRANT, P.O. CHANDANWARI, PREMNAGAR, DEHRADUN - 248007, UTTARAKHAND, INDIA

Inventors

1. DEVENDER SINGH
UTTARANCHAL INSTITUTE OF TECHNOLOGY, UTTARANCHAL UNIVERSITY, ARCADIA GRANT, P.O. CHANDANWARI, PREMNAGAR, DEHRADUN - 248007, UTTARAKHAND, INDIA
2. TIKSHITA SINGH
LAW COLLEGE DEHRADUN UTTARANCHAL UNIVERSITY, ARCADIA GRANT, P.O. CHANDANWARI, PREMNAGAR, DEHRADUN - 248007, UTTARAKHAND, INDIA
3. RAJESH SINGH
UTTARANCHAL INSTITUTE OF TECHNOLOGY, UTTARANCHAL UNIVERSITY, ARCADIA GRANT, P.O. CHANDANWARI, PREMNAGAR, DEHRADUN - 248007, UTTARAKHAND, INDIA
4. ANITA GEHLOT
UTTARANCHAL INSTITUTE OF TECHNOLOGY, UTTARANCHAL UNIVERSITY, ARCADIA GRANT, P.O. CHANDANWARI, PREMNAGAR, DEHRADUN - 248007, UTTARAKHAND, INDIA
5. DHARAM BUDDHI
UTTARANCHAL INSTITUTE OF TECHNOLOGY, UTTARANCHAL UNIVERSITY, ARCADIA GRANT, P.O. CHANDANWARI, PREMNAGAR, DEHRADUN - 248007, UTTARAKHAND, INDIA
6. ABHISHEK JOSHI
UTTARANCHAL UNIVERSITY, ARCADIA GRANT, P.O. CHANDANWARI, PREMNAGAR, DEHRADUN - 248007, UTTARAKHAND, INDIA
7. SHIV DAYAL PANDEY
UTTARANCHAL INSTITUTE OF TECHNOLOGY, UTTARANCHAL UNIVERSITY, ARCADIA GRANT, P.O. CHANDANWARI, PREMNAGAR, DEHRADUN - 248007, UTTARAKHAND, INDIA

Specification

Description:FIELD OF THE INVENTION
This invention relates to Fake Product Detection System Using Blockchain And Iot Technology
BACKGROUND OF THE INVENTION
Consumers may purchase counterfeit items inadvertently, believing them to be real. Counterfeit items may be of poor quality, pose a risk to one's health or safety, and fail to fulfil regulatory requirements. Consumers may waste their money on counterfeit goods, believing they are purchasing genuine goods. Counterfeit goods are frequently marketed at reduced costs, enticing shoppers with seeming savings. Consumers, on the other hand, wind up with low-quality or useless items, resulting in financial losses.
US8055633B2 A method of duplicate detection for data items in a stream of data items, the method comprising the steps of: receiving a data item from the stream of data items; applying at least two different hashing algorithms to the data item to generate hash keys that identify elements in a first bloom filter data structure having a plurality of elements; checking a state of each of the identified elements to determine if the data item is a potential duplicate, the determination depending on whether the identified elements are indicated as having been also identified for a previous data item received from the stream; and in response to the determination that the data item is a potential duplicate, checking an index of hash keys to determine if at least one of the generated hash keys exists in the index to identify the data item as an actual duplicate.
Research Gap: The technology improves product authenticity verification, allowing consumers to select genuine items with confidence. This decreases the danger of acquiring counterfeit products while also ensuring that customers receive the quality and safety they expect.
CN106434871B The present invention provides compositions, devices and methods for detecting one or more nucleic acid targets present in a sample. The methods of the invention include the use of two or more ligation probes that reversibly bind tightly to each other target nucleic acids and have complementary reactive ligation moieties. When these probes have bound to the target in the proper orientation, they can undergo a spontaneous chemical ligation reaction to give a ligation product, which is detected directly, or amplified to produce amplicons, which are then detected. The present invention also provides methods to stabilize sample RNA so that degradation does not significantly affect the results of the analysis.
Research Gap: Transparency and traceability are provided across the supply chain through IoT devices and blockchain technology. Stakeholders can trace the product's route from manufacture through distribution to sale, assuring accountability and lowering the likelihood of counterfeit items entering the market.
US8055633B2 A method of duplicate detection for data items in a stream of data items, the method comprising the steps of: receiving a data item from the stream of data items; applying at least two different hashing algorithms to the data item to generate hash keys that identify elements in a first bloom filter data structure having a plurality of elements; checking a state of each of the identified elements to determine if the data item is a potential duplicate, the determination depending on whether the identified elements are indicated as having been also identified for a previous data item received from the stream; and in response to the determination that the data item is a potential duplicate, checking an index of hash keys to determine if at least one of the generated hash keys exists in the index to identify the data item as an actual duplicate.
Research Gap: Blockchain technology enables tamper-proof and immutable data storage. Data cannot be edited or tampered with once it is stored on the blockchain, maintaining the integrity of product information and verification records.
None of the prior art indicate above either alone or in combination with one another disclose what the present invention has disclosed. Present invention is Fake Product Detection System Using Blockchain And Iot Technology
SUMMARY OF THE INVENTION
This summary is provided to introduce a selection of concepts, in a simplified format, that are further described in the detailed description of the invention.
This summary is neither intended to identify key or essential inventive concepts of the invention and nor is it intended for determining the scope of the invention.
To further clarify advantages and features of the present invention, a more particular description of the invention will be rendered by reference to specific embodiments thereof, which is illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings.
The figure1.1 A fake product identification system based on IoT (Internet of Things) and blockchain technology can be a strong weapon in combating market counterfeits. This solution combines the advantages of IoT devices for data collecting with the advantages of blockchain for safe and immutable data storage Depending on the system's unique requirements and the nature of the items being monitored, many types of sensors can be utilized in a false product detection system based on IoT and blockchain technology, The controlling unit (101) is in charge of overseeing the entire operation of the bogus product detecting system. It is in charge of the deployment, setup, and upkeep of IoT devices, the blockchain network, and the accompanying software applications It is in charge of collecting, storing, and analyzing data generated by IoT devices. It guarantees that data is delivered securely to the blockchain network for verification and storage. This involves putting in place data encryption, access limits, and backup plans, RFID tags (102) RFID tags carry electronically recorded data that may be read wirelessly by RFID readers. These tags, which give unique identifying codes, can be added to objects or packaging. RFID scanners may be used at many locations along the supply chain to track product movement and validity, Bar code scanner (103) Optical sensors that read barcodes placed on product labels or packaging are known as barcode scanners. They can swiftly capture product information such as the manufacturer, product type, and serial numbers for verification and counterfeit detection, QR code scanner (104) QR codes are two-dimensional barcodes that may be scanned with cellphones or special scanners. QR codes may hold more information than standard barcodes and can be used to link to product-specific data held in the blockchain, allowing customers or authorized parties to easily verify the information, Temperature & Humidity sensor (105) These sensors can be used to monitor environmental conditions during product shipping and storage. Temperature or humidity deviations from anticipated values might suggest manipulation or counterfeiting, GPS (106) GPS sensors can be included in items or packaging to track their whereabouts in real time throughout the supply chain. This information may be used to determine if the product is being distributed as planned or whether it has been diverted to unauthorized places, chemical or material analyse sensor (107) Advanced sensors can be employed to analyse the product's composition or features. Spectroscopy sensors, for example, may detect the presence of certain compounds or molecules that should be present in authentic items, assisting in the identification of counterfeits, Light sensor (108) Changes in light intensity or patterns can be detected using light sensors. They can be used to detect tampered with or changed packaging or labels, as well as to identify counterfeit holograms or security features that may react differently to light, Weight sensor (109) Weight sensors are useful for determining the weight of objects or packaging. Any considerable differences from the estimated weight may indicate the presence of counterfeit goods or manipulation, Accelerometers sensor (109) are devices that measure changes in acceleration or motion. They can be used to identify tampering or replacement by detecting whether a product has been mistreated or fallen during transportation, Gas sensor (111) Specific gases or volatile chemicals can be detected using gas sensors. They can be used to detect counterfeit goods or compounds that should not be present in real goods, such as counterfeit fragrances, drinks, or medications, Magnetic field sensor (112) Magnetic field sensors are capable of detecting variations in magnetic fields. They can be used to validate the validity of magnetically secured items or to identify the existence of magnetic tampering devices. Pressure sensor (113) Pressure sensors detect variations in pressure. They can identify whether a package has been opened or whether seals have been broken, suggesting possible manipulation, image sensor (114) Cameras or optical scanners with image sensors can be used to take photographs or scan visual aspects of objects, labels, or packaging. The collected photos may then be compared to reference photographs using image analysis techniques to discover any differences or indicators of forgery, and the LoRa make the communication between all the sensor, and the entire receive power from battery (115).
The figure 1.2 consists of computing unit (101) it acts as the brain of the system, controlling the flow of information and executing the necessary operations It establishes the connection with the remote monitoring platform or application and manages the exchange of data between the system and the monitoring interface, computing unit send all the information cloud server (107) via internet to Web application (108) through web app we can see all the information.
BRIEF DESCRIPTION OF THE DRAWINGS
The illustrated embodiments of the subject matter will be understood by reference to the drawings, wherein like parts are designated by like numerals throughout. The following description is intended only by way of example, and simply illustrates certain selected embodiments of devices, systems, and methods that are consistent with the subject matter as claimed herein, wherein:
Figure1.1 System Architecture
Figure1.2 System Architecture
The figures depict embodiments of the present subject matter for the purposes of illustration only. A person skilled in the art will easily recognize from the following description that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles of the disclosure described herein.
DETAILED DESCRIPTION OF THE INVENTION
The detailed description of various exemplary embodiments of the disclosure is described herein with reference to the accompanying drawings. It should be noted that the embodiments are described herein in such details as to clearly communicate the disclosure. However, the amount of details provided herein is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the scope of the present disclosure as defined by the appended claims.
It is also to be understood that various arrangements may be devised that, although not explicitly described or shown herein, embody the principles of the present disclosure. Moreover, all statements herein reciting principles, aspects, and embodiments of the present disclosure, as well as specific examples, are intended to encompass equivalents thereof.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms “a",” “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises,” “comprising,” “includes” and/or “including,” when used herein, specify the presence of stated features, integers, steps, operations, elements and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components and/or groups thereof.
It should also be noted that in some alternative implementations, the functions/acts noted may occur out of the order noted in the figures. For example, two figures shown in succession may, in fact, be executed concurrently or may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
In addition, the descriptions of "first", "second", “third”, and the like in the present invention are used for the purpose of description only, and are not to be construed as indicating or implying their relative importance or implicitly indicating the number of technical features indicated. Thus, features defining "first" and "second" may include at least one of the features, either explicitly or implicitly.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which example embodiments belong. It will be further understood that terms, e.g., those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
These and other advantages of the present subject matter would be described in greater detail with reference to the following figures. It should be noted that the description merely illustrates the principles of the present subject matter. It will thus be appreciated that those skilled in the art will be able to devise various arrangements that, although not explicitly described herein, embody the principles of the present subject matter and are included within its scope.
The figure1.1 A fake product identification system based on IoT (Internet of Things) and blockchain technology can be a strong weapon in combating market counterfeits. This solution combines the advantages of IoT devices for data collecting with the advantages of blockchain for safe and immutable data storage Depending on the system's unique requirements and the nature of the items being monitored, many types of sensors can be utilized in a false product detection system based on IoT and blockchain technology, The controlling unit (101) is in charge of overseeing the entire operation of the bogus product detecting system. It is in charge of the deployment, setup, and upkeep of IoT devices, the blockchain network, and the accompanying software applications It is in charge of collecting, storing, and analyzing data generated by IoT devices. It guarantees that data is delivered securely to the blockchain network for verification and storage. This involves putting in place data encryption, access limits, and backup plans, RFID tags (102) RFID tags carry electronically recorded data that may be read wirelessly by RFID readers. These tags, which give unique identifying codes, can be added to objects or packaging. RFID scanners may be used at many locations along the supply chain to track product movement and validity, Bar code scanner (103) Optical sensors that read barcodes placed on product labels or packaging are known as barcode scanners. They can swiftly capture product information such as the manufacturer, product type, and serial numbers for verification and counterfeit detection, QR code scanner (104) QR codes are two-dimensional barcodes that may be scanned with cellphones or special scanners. QR codes may hold more information than standard barcodes and can be used to link to product-specific data held in the blockchain, allowing customers or authorized parties to easily verify the information, Temperature & Humidity sensor (105) These sensors can be used to monitor environmental conditions during product shipping and storage. Temperature or humidity deviations from anticipated values might suggest manipulation or counterfeiting, GPS (106) GPS sensors can be included in items or packaging to track their whereabouts in real time throughout the supply chain. This information may be used to determine if the product is being distributed as planned or whether it has been diverted to unauthorized places, chemical or material analyse sensor (107) Advanced sensors can be employed to analyse the product's composition or features. Spectroscopy sensors, for example, may detect the presence of certain compounds or molecules that should be present in authentic items, assisting in the identification of counterfeits, Light sensor (108) Changes in light intensity or patterns can be detected using light sensors. They can be used to detect tampered with or changed packaging or labels, as well as to identify counterfeit holograms or security features that may react differently to light, Weight sensor (109) Weight sensors are useful for determining the weight of objects or packaging. Any considerable differences from the estimated weight may indicate the presence of counterfeit goods or manipulation, Accelerometers sensor (109) are devices that measure changes in acceleration or motion. They can be used to identify tampering or replacement by detecting whether a product has been mistreated or fallen during transportation, Gas sensor (111) Specific gases or volatile chemicals can be detected using gas sensors. They can be used to detect counterfeit goods or compounds that should not be present in real goods, such as counterfeit fragrances, drinks, or medications, Magnetic field sensor (112) Magnetic field sensors are capable of detecting variations in magnetic fields. They can be used to validate the validity of magnetically secured items or to identify the existence of magnetic tampering devices. Pressure sensor (113) Pressure sensors detect variations in pressure. They can identify whether a package has been opened or whether seals have been broken, suggesting possible manipulation, image sensor (114) Cameras or optical scanners with image sensors can be used to take photographs or scan visual aspects of objects, labels, or packaging. The collected photos may then be compared to reference photographs using image analysis techniques to discover any differences or indicators of forgery, and the LoRa make the communication between all the sensor, and the entire receive power from battery (115).
The figure 1.2 consists of computing unit (101) it acts as the brain of the system, controlling the flow of information and executing the necessary operations It establishes the connection with the remote monitoring platform or application and manages the exchange of data between the system and the monitoring interface, computing unit send all the information cloud server (107) via internet to Web application (108) through web app we can see all the information.
ADVANTAGES OF THE INVENTION:
1. IoT devices capture data regarding product conditions such as location, temperature, and humidity in real time. This real-time monitoring enables for the early detection of any deviations or irregularities that may indicate counterfeiting or supply chain concerns.
2. The system can instantly discover disparities or evidence of counterfeit activity by automating the verification process with smart contracts. This allows for immediate responses, such as sending alerts and launching investigations, minimising the time required to discover and manage counterfeit items.
3. The method enables customers to independently check the legitimacy of items. Consumers may make educated purchase decisions and avoid counterfeit items by scanning QR codes or obtaining product information through mobile applications.
4. Genuine brands profit from greater counterfeit protection. The method protects brand reputation by preventing counterfeit items from entering the market, retaining consumer trust, and remaining competitive in the market.
5. The information gathered can be used as evidence in court proceedings against counterfeiters. The system provides a trustworthy and transparent record of product authenticity, assisting law enforcement and regulatory authorities in their investigations and enforcement operations.
, Claims:We Claim:
1. A Fake Product Detection System Using Blockchain And Iot Technology Comprises Controlling Unit (101), RFID Tags (102), Bar Code Scanner (104), Temperature & Humidity Sensor (105), GPS (106), Chemical Or Material Analyze Sensor (107), Light Sensor (108), Weight Sensor (109), Accelerometers (110), Gas Sensor (111), Magnetic Field Sensor (112) Pressure Sensor (113), Image Sensor (114), Battery (115) Controlling Unit (101), Cloud Server (107), and Web App (108)
2 The system as claimed in claim 1, wherein the controlling unit (101) is in charge of overseeing the entire operation of the bogus product detecting system; and it is in charge of the deployment, setup, and upkeep of IoT devices, the blockchain network, and the accompanying software applications It is in charge of collecting, storing, and analyzing data generated by IoT devices; which guarantees that data is delivered securely to the blockchain network for verification and storage.
3. The system as claimed in claim 1, wherein system involves putting in place data encryption, access limits, and backup plans, RFID tags (102) RFID tags carry electronically recorded data that reads wirelessly by RFID readers; and said tags, which give unique identifying codes, can be added to objects or packaging.
4. The system as claimed in claim 1, wherein RFID scanners is used at many locations along the supply chain to track product movement and validity, Bar code scanner (103) Optical sensors that read barcodes placed on product labels or packaging are known as barcode scanners; and they swiftly capture product information such as the manufacturer, product type, and serial numbers for verification and counterfeit detection, QR code scanner (104) QR codes are two-dimensional barcodes that is scanned with cellphones or special scanners. QR codes may hold more information than standard barcodes and is used to link to product-specific data held in the blockchain, allowing customers or authorized parties to easily verify the information.
5. The system as claimed in claim 1, wherein Temperature & Humidity sensor (105) are used to monitor environmental conditions during product shipping and storage; and Temperature or humidity deviations from anticipated values might suggest manipulation or counterfeiting, GPS (106) GPS sensors can be included in items or packaging to track their whereabouts in real time throughout the supply chain; and said information is used to determine if the product is being distributed as planned or whether it has been diverted to unauthorized places, chemical or material.
6. The system as claimed in claim 1, wherein analyse sensor (107) are employed to analyse the product's composition or features. Spectroscopy sensors, for example, may detect the presence of certain compounds or molecules that should be present in authentic items, assisting in the identification of counterfeits, Light sensor (108) Changes in light intensity or patterns are detected using light sensors.
7. The system as claimed in claim 1, wherein system is used to detect tampered with or changed packaging or labels, as well as to identify counterfeit holograms or security features that may react differently to light, Weight sensor (109) Weight sensors are useful for determining the weight of objects or packaging.
8. The system as claimed in claim 1, wherein Accelerometers sensor (109) are devices that measure changes in acceleration or motion; which is used to identify tampering or replacement by detecting whether a product has been mistreated or fallen during transportation, Gas sensor (111) Specific gases or volatile chemicals are detected using gas sensors.
9. The system as claimed in claim 1, wherein system is used to detect counterfeit goods or compounds that should not be present in real goods, such as counterfeit fragrances, drinks, or medications, Magnetic field sensor (112) Magnetic field sensors are capable of detecting variations in magnetic fields; and Pressure sensor (113) Pressure sensors detect variations in pressure; and identify whether a package has been opened or whether seals have been broken, suggesting possible manipulation, image sensor (114) Cameras or optical scanners with image sensors are used to take photographs or scan visual aspects of objects, labels, or packaging; and the collected photos may then be compared to reference photographs using image analysis techniques to discover any differences or indicators of forgery, and the LoRa make the communication between all the sensor, and the entire receive power from battery (115).
10. The system as claimed in claim 1, wherein computing unit (101) it acts as the brain of the system, controlling the flow of information and executing the necessary operations which establishes the connection with the remote monitoring platform or application and manages the exchange of data between the system and the monitoring interface, computing unit send all the information cloud server (107) via internet to Web application (108) through web app to see all the information.

Documents

Application Documents

# Name Date
1 202311072054-STATEMENT OF UNDERTAKING (FORM 3) [21-10-2023(online)].pdf 2023-10-21
2 202311072054-REQUEST FOR EARLY PUBLICATION(FORM-9) [21-10-2023(online)].pdf 2023-10-21
3 202311072054-POWER OF AUTHORITY [21-10-2023(online)].pdf 2023-10-21
4 202311072054-FORM-9 [21-10-2023(online)].pdf 2023-10-21
5 202311072054-FORM FOR SMALL ENTITY(FORM-28) [21-10-2023(online)].pdf 2023-10-21
6 202311072054-FORM 1 [21-10-2023(online)].pdf 2023-10-21
7 202311072054-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [21-10-2023(online)].pdf 2023-10-21
8 202311072054-EDUCATIONAL INSTITUTION(S) [21-10-2023(online)].pdf 2023-10-21
9 202311072054-DRAWINGS [21-10-2023(online)].pdf 2023-10-21
10 202311072054-DECLARATION OF INVENTORSHIP (FORM 5) [21-10-2023(online)].pdf 2023-10-21
11 202311072054-COMPLETE SPECIFICATION [21-10-2023(online)].pdf 2023-10-21
12 202311072054-FORM 18 [20-06-2025(online)].pdf 2025-06-20