Abstract: The present invention relates to a supply chain based track and trace system (100) for performing supply chain traceability and serialization for tackling counterfeiting issues and the system includes stages like serialization, track and trace, consumer authentication and involves code generation via format-preserving encryption (FPE) process and encrypting the code codes using an encryption process to maintain high security and comprises of a code generation module (1), a serialization module (2), a track and trace module (3), a consumer authentication module (4) and a reporting module (5) that enables the complete tracking of products through the supply chain for detecting if there is any counterfeit product or if a product is diverted through the grey market. Figure 1 on sheet no. 1 of the drawings may accompany the abstract when published.
DESC:FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENT RULES, 2003
COMPLETE SPECIFICATION
[See Section 10 and Rule 13]
TITLE:
“A SUPPLY CHAIN BASED TRACK AND TRACE SYSTEM AND METHOD THEREOF”
APPLICANT:
PHARMASECURE PRODUCT AUTHENTICATION SERVICES INDIA PVT. LTD.
A company incorporated under the Indian Companies Act, 1956
having address at
S-211, GREATER KAILASH, PART – 2,
NEW DELHI – 110048, DELHI, INDIA
PREAMBLE TO THE DESCRIPTION:
The following specification particularly describes the invention and the manner in which it is to be performed:
FIELD OF THE INVENTION
The present invention relates to a supply chain based track and trace system and method. More particularly, the present invention relates to a supply chain based track and trace system for performing supply chain traceability and serialization to tackle counterfeiting issues.
BACKGROUND OF THE INVENTION
Counterfeit refers to imitate some authentic product with an intent to replace, steal, and destroy the original piece and the act of counterfeiting not only harms the buyer but also has a significant impact on the company as well as economy of any country. Numerous brands are suffering enormous losses as a result of counterfeiting, including lost revenue, consumer dissatisfaction, irreparable brand reputation damage, and so on. According to the global brand counterfeiting report, global counterfeiting exceeds USD 509 billion annually.
Counterfeiting directly affects government expenditures and tax revenues. It also has a negative impact on employment, which is felt by retailers, distributors, and the supply chain. Counterfeit products are made in unregulated conditions with low-quality substances and are not subjected to mandatory quality checks. Numerous counterfeit products, including medicines, electrical and electronic accessories, toys, food items, and car parts badly impacts the buyer health and life.
For example, pharmaceutical industries serve drugs to enhance the lives of billion people suffering from many health problems. Pharma industries are loaded with responsibilities of research and development and consistent manufacturing of medicines and drugs for various diseases and health conditions to improve the condition of the patient. Hence, it is necessary to secure the drugs from being copied. Otherwise, it will imply bad impact on the brand of the product as well as the consumer.
To resolve the issue of counterfeit, numerous advanced technologies have been introduced in the market. The systems and methods to detect or limit the counterfeit products available in the market includes several modules like scanning module, verification module, database module, feedback module. However, still there is no system or solution for tackling counterfeiting issues accurately.
CN103998955B discloses a personalized secure product and the method for differentiating holder of the method for security article with verifying security article. More particularly, the security feature is composograph which contains the security information of laser personalization. A kind of laser personalized secured product comprising sheet material, donor material, microlens layer having first side and second side, first printing mark and second printing mark. By at least one of the first composograph formed in each local complete image. In the view of visually, described first composograph is floated over above the sheet material, the second composograph formed by each local complete image. The security article is watched by comparing first printing mark with first composograph and second printing mark with second composograph. However, this invention does not provide high-level security for tackling counterfeiting issues accurately.
US8498941B2 discloses a system and a method having information record. This is a method for controlling access to plurality of records within plurality of automated databases. This is a data security apparatus for controlling access to plurality of records which contains a set of rules to access. The set of rules comprising receiving by a security processor, a request for accessing records associated with at least one of a datum from a requestor, determining a set of records associated with the requested datum, authorizing access to the records within the determined set of records based on compliance with associated set of access rules, defining an economic compensation rule, in which satisfaction is required for qualification for access to the set of records; selectively permitting access to records in dependence on satisfaction of the compensation rule; communicating the access permissions to the host automated electronic databases; and logging the request for retrieval and a respective access of each record. However, this invention does not provide high-level security for tackling counterfeiting issues accurately.
Therefore, there is a need of a system and method for ensuring high level security for tackling counterfeiting issues accurately.
OBJECT OF THE INVENTION
The main object of the present invention is to provide a supply chain based track and trace system for performing supply chain traceability and serialization for tackling counterfeiting issues.
Another object of the present invention is to provide a supply chain based track and trace system that includes stages like serialization, track and trace, consumer authentication.
Yet another object of the present invention is to provide a supply chain based track and trace system which involves code generation via encryption-decryption technology.
Yet another object of the present invention is to provide a supply chain based track and trace system that maintains high security.
Still another object of the present invention is to provide a supply chain based track and trace system that enables the complete tracking of products through the supply chain for detecting if there is any counterfeit product or if a product is diverted through the grey market.
SUMMARY OF THE INVENTION
The present invention relates to a system to track and trace a product or package in supply chain comprising a code generation module configured to generate a set of codes, a serialization module configured to request, receive and print the codes, a track and trace module configured to track and authenticate the product in supply chain, a consumer authentication module configured to authenticate the product at consumer end, a recording module configured to store and analyse the data related to the product tracking and authentication, a centralized server configured to communicate with said modules over a communication network. The serialization module is configured to initiate request for a set of codes to be generated by the code generation module. The code generation module is configured to generate said set of codes of variable length using format-preserving encryption (FPE) process in response to the received request. The code generation module is configured to generate a set of counters, and generate set of codes by encrypting the set of counters using a binary key pointer according to said code length, wherein the binary key pointer includes compilation of a pair of encryption keys, said pair of keys comprises a Key High and a Key Low generated for each code length of said generated set of codes and said pair of keys are provided to two different key vaults. The code generation module transfers said set of encrypted codes to said serialization module. The serialization module receives the set of encrypted codes as a part of barcodes or 2D codes to be printed on package for authentication at a given authentication site. The track and trace module is configured to authenticate the product in supply chain by decrypting said set of encrypted codes. The track and trace module is further configured to authenticate a given destination of the product in supply chain by decrypting said set of encrypted codes. The consumer authentication module is configured to decrypt and verify said set of encrypted codes on said printed codes on the package enabling verification by notification medium including SMS, internet messaging and/or scanning.
In another embodiment, the present invention provides a method for tracking and tracing a product or packaging in a supply chain, the method comprising the steps of: a) initiating a request for a set of codes, b) generating of set of counters, c) encrypting the set of counters generated in step b) to generate codes of variable length, d) receiving the encrypted set of codes of step c) and creating a bar code or 2D code, e) printing said bar code/2D code of step d) on a package to be tracked and traced, f) scanning said printed bar code/2D code, and g) authenticating the product and/or destination at a given authentication site by decrypting the set of codes in code scanned in step g). The set of codes are generated using format-preserving encryption (FPE) process and are of variable length. The set of codes are generated by encrypting the counters using a binary key pointer, wherein the binary key pointer is generated by compilation of a pair of encryption keys, said pair of keys are a Key High and a Key Low generated for each code length of said generated set of codes. The pair of encryption keys are provided to two different key vaults. The set of encrypted codes forms a part of the barcodes or 2D codes to be printed on the package for authentication at a given authentication site.
In yet another embodiment, generation of set of codes comprises allocating a lot identification value, a total lot size for an order of a plurality of products, begin and end counter values for the codes and generating the plurality of authentication codes based on the lot identification value and the total lot size, and updating a counter table in the code generation module.
The above objects and advantages of the present invention will become apparent from the hereinafter set forth brief description of the drawings, detailed description of the invention, and claims appended herewith.
BRIEF DESCRIPTION OF THE DRAWING
An understanding of the supply chain based track and trace system of the present invention may be obtained by reference to the following drawings:
Figure 1 is a block diagram of the supply chain based track and trace system according to an embodiment of the present invention.
Figure 2 is a flow chart of working of authentication module of the supply chain based track and trace system according to an embodiment of the present invention.
Figure 3 is a flow chart of working of consumer module according to an embodiment of the present invention.
Figure 4 is a flow diagram of working of track and trace module of the supply chain based track and trace system according to an embodiment of the present invention.
Figure 5a, 5b and 5c are flow diagrams of system to track and trace a product in supply chain supply chain according to an embodiment of the present invention.
Figure 6a and 6b are flow diagrams of key management process in a supply chain based track and trace system according to an embodiment of the present invention.
Figure 7 is a flow diagram of code ordering process in a supply chain based track and trace system according to an embodiment of the present invention.
DETAILED DESCRIPTION OF THE INVENTION
The present invention will now be described hereinafter with reference to the accompanying drawings in which a preferred embodiment of the invention is shown. This invention may, however, be embodied in many different forms and should not be construed as being limited to the embodiment set forth herein. Rather, the embodiment is provided so that this disclosure will be thorough, and will fully convey the scope of the invention to those skilled in the art.
Many aspects of the invention can be better understood with references made to the drawings below. The components in the drawings are not necessarily drawn to scale. Instead, emphasis is placed upon clearly illustrating the components of the present invention. Moreover, like reference numerals designate corresponding parts through the several views in the drawings. Before explaining at least one embodiment of the invention, it is to be understood that the embodiments of the invention are not limited in their application to the details of construction and to the arrangement of the components set forth in the following description or illustrated in the drawings. The embodiments of the invention are capable of being practiced and carried out in various ways. In addition, the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting.
The present invention provides a supply chain based track and trace system for performing supply chain traceability and serialization for tackling counterfeiting issues.
In an embodiment, the present invention provides a system to track and trace a product or package in supply chain comprising a code generation module configured to generate a set of codes, a serialization module configured to request, receive and print the codes, a track and trace module configured to track and authenticate the product in supply chain, a consumer authentication module configured to authenticate the product at consumer end, a recording module configured to store and analyse the data related to the product tracking and authentication, a centralized server configured to communicate with said modules over a communication network. The serialization module is configured to initiate request for a set of codes to be generated by the code generation module. The code generation module is configured to generate said set of codes of variable length using format-preserving encryption (FPE) process in response to the received request. It generates the set of set of counters and generate set of codes by encrypting the set of counters using a binary key pointer according to said code length, wherein the binary key pointer includes compilation of a pair of encryption keys, said pair of keys comprises a Key High and a Key Low generated for each code length of said generated set of codes and said pair of keys are provided to two different key vaults. The code generation module transfers said set of encrypted codes to said serialization module. The serialization module receives the set of encrypted codes as a part of barcodes or 2D codes to be printed on package for authentication at a given authentication site. The track and trace module is configured to authenticate the product in supply chain by decrypting said set of encrypted codes. The track and trace module is further configured to authenticate a given destination of the product in supply chain by decrypting said set of encrypted codes. The consumer authentication module is configured to decrypt and verify said set of encrypted codes on said printed codes on the package enabling verification by notification medium including SMS, internet messaging and/or scanning.
In another embodiment, the present invention provides a method for tracking and tracing a product or packaging in a supply chain, the method comprising the steps of: a) initiating a request for a set of codes, b) generating of set of counters, c) encrypting the set of counters generated in step b) to generate codes of variable length, d) receiving the encrypted set of codes of step c) and creating a bar code or 2D code, e) printing said bar code/2D code of step d) on a package to be tracked and traced, f) scanning said printed bar code/2D code, and g) authenticating the product and/or destination at a given authentication site by decrypting the set of codes in code scanned in step g). The set of codes are generated using format-preserving encryption (FPE) process and are of variable length. The set of codes are generated by encrypting the counters using a binary key pointer, wherein the binary key pointer is generated by compilation of a pair of encryption keys, said pair of keys are a Key High and a Key Low generated for each code length of said generated set of codes. The pair of encryption keys are provided to two different key vaults. The set of encrypted codes forms a part of the barcodes or 2D codes to be printed on the package for authentication at a given authentication site.
In yet another embodiment, generation of set of codes comprises allocating a lot identification value, a total lot size for an order of a plurality of products, begin and end counter values for the codes and generating the plurality of authentication codes based on the lot identification value and the total lot size, and updating a counter table in the code generation module.
Referring to Figure 1, a block diagram of the supply chain based track and trace system (100) is depicted. The supply chain based track and trace system (100) comprises of a code generation module (1), a serialization module (2), a track and trace module (3), a consumer authentication module (4) and a recording module (5).
The code generation module (1) works on encryption based codes and includes the steps of a) enabling a code generation of variable length, wherein the length is the number of alphanumeric characters in the code so generated. The code generation process comprises allocating a lot identification value and total size for an order of plurality of product authentication code, generating the plurality of authentication codes based on lot identification value and total lot size, and updating a counter table on a centralized server, herein the counter table manages a lot identifier value for the codes and a begin and end value for the counter to generate code values, b) securing said code generation via binary key pointer, said binary key pointer is generated by compilation of a pair of encryption keys, wherein said pair of encryption keys are a Key High and a Low Key that are provided to two different vaults, and c) expanding said code generation to produce code up to length up to 20 characters. Additionally, the code generation module (1) has an ability to customize the set of characters that are used to generate the encrypted codes, this helps to meet any specific custom client needs, for instance, if there is a requirement of only numbers for code length 11 then it is defined as the charset in the system as [0123456789] and the system generates random 11 digit numeric codes.
The serialization module (2) receives and uses the encryption based codes as part of the barcodes that are printed on package or product for the purpose of unique identification, thus enabling a higher level of security and complete randomness, guaranteed uniqueness, and scalability. The regulations for serialization ask for a unique code as per GS1 standards (internationally recognized standards for serialization) or any other standard as per country requirements. The serialization module enables a higher level of security and complete randomness, guaranteed uniqueness, and scalability (as there is no slowdown caused by the database size increasing). This application of the encryption-based codes enables fulfilment of serialization regulations in a highly secure and scalable manner. The serialization module (2) aggregates different level of codes to establish a parent-child relationship for packing/products. In an exemplary situation, the serialization module shall generate individual codes for all the units of product which are packed and supplied together. The package having the multiple product shall be having another set of codes, such that the code for the package and the codes for the products inside shall be in multi-level mode establishing a parent – child relationship.
The track and trace module (3) uses encryption based codes to enable the complete tracking of products through a supply chain, detecting if there is any counterfeit product or if a product is diverted through grey market, or if a product has been routed to wrong destination inadvertently. The consumer authentication module (4) applies encryption based codes on said product to enable verification by any kind of notification medium, like SMS, internet messaging, and scanning. The consumer module (5), through which a consumer of the product scans the encryption-based codes and receives a loyalty point, uses a rule-based engine that calculates and, based on a set of certain parameters, provides rewards to the consumer.
Referring to Figure 2, a flow chart of working of authentication module (4) of the supply chain based track and trace system according to an embodiment of the present invention is depicted. The consumer authentication module (4) apply the encryption-based codes onto product packages and enable verification/authentication by SMS, or other messaging application, Web, and scanning. The verification response is highly customizable and uses a rule-based powered engine to detect and auto-generate responses based on certain parameters. The auto-generated responses are related to loyalty point, consumer engagement, diversion alert, greetings, batch recall and others. Such as, if any brand wants to gratify a consumer based on some predefined intelligent pattern like for every tenth purchase, consumer gets a reward of INR 50 cash, or if any brand wishes to greet a consumer during any occasion then verification during this period will trigger an appropriated customized message. A diversion alert is triggered if any a packaging batch is shipped to any other geographic location instead of a specific geography location.
Referring to Figure 3, a flow chart of working of consumer module (6) is depicted. The system includes a consumer module (6) through which the consumer of the product scans said set of encryption based codes and receives a loyalty point on said consumer module, and then the rule-based powered engine calculates the loyalty point and based on a set of certain parameters, provides rewards as per the preference of any brand.
Referring to Figure 4, a flow chart of working of the track and trace module (3) is depicted. The track and trace module (3) enables the complete tracking of products through the supply chain, detecting if there is any counterfeit product or if a product is diverted through the grey market. This is done via a centralized server supported by mobile apps. The process initiates with the request for a set of codes by generation module, and then the code generation module generates a set of counters that are encrypted by using a binary key pointer that comprises a pair of encryption keys such that the keys provided to two different vaults, and then transfers said set of encrypted codes to said serialization module to generate a unique serialization or barcode. The encrypted sets of codes are the part of barcodes to be applied to the products for authentication at a given authentication site. Further, the track and trace module authenticates the product in the supply chain by decrypting said set of encrypted codes via scanning of barcodes, for instance at distributor, wholesaler, retailer and others. The whole process is managed by the centralized server supported by the device scanner. Use of the encryption codes allows an unmatched level of security and scalability.
Figure 5a, 5b and 5c are flow diagrams of process to track and trace a product in supply chain supply chain according to an embodiment of the present invention. This process includes initiating a request for a set of codes by an OEM/Manufacturer, generation of a set of counters and encrypting the set of counters is performed by a code generation module. Further receiving the encrypted set of codes and creating a bar code or 2D code is performed by serialization module. The serialization module further prints said bar code/2D code on a product or package to be tracked and traced such as codes can be printed in form of label, tag, tickets or others. Then the serialization module aggregate with different levels of packaging in order to establish parent-child relationship and a file is generated having all the codes and aggregation information and transmitting the file to a databased in a track and trace module. The Track and Trace module is configured to initiate the dispatch consignment process. In this process, the user logs in to the track and trace portal of the track and trace module and then opens a dispatch consignment platform to add the consignment details to the portal. A consumer authentication module scans the bar code intended for dispatch and authenticate the bar code printed on the product. If the authentication is successful, indicating a successful authentication and saving the authentication data and generating a shipping notification. If the initial scan is unsuccessful, the consumer authentication module continues to scan more barcodes or 2D codes until a successful authentication is achieved. After successful authentication of the barcodes at the dispatch site, a shipping notification is generated and the packages are sent further to receiving site. At the receiving site, the consumer logs in to the track and trace portal on a consumer authentication module and opens a receive consignment module and selects the consignment received. The consumer authentication device scans the barcode or 2D code from the received consignment. If the scanned code is valid, then the method proceeds to check the destination of the consignment. If both the validity successfully authenticated then track and trace module marks the consignment as received and saves the data/information to the centralized server.
Figure 6a and 6b are flow diagrams of key management processes in a supply chain-based track and trace system according to an embodiment of the present invention. The process involves the generation of two distinct keys, i.e., Key High and Key Low, provided to two different key vaults or custodians. These two sets of keys are saved in their own respective text files, and then the text files are separately encrypted with an encryption process such as GPG encryption process. The encrypted files are then copied to a secure remote system such as SFTP location, further copied to a thumb drive, and then permanently deleted from the local system. Thus, the system provides a higher level of security for the generated codes. Then both thumb drives on which encrypted keys are saved are taken by a binary administrator. On the other hand, a server administrator receives a new authentication site request and then the server administrator checks whether the authentication site already exists then creates a record in a counter table, otherwise creates a new authentication site entry of a defined code length. The authentication site code is then generated and provided to the binary administrator. The binary administrator creates the communication channel with the centralized server to initiate the process of compilation of the generated encryption keys (Key Low and Key High) which are uses to encrypt the produced authentication site code, and then the compiled code are produced into a key binary form. The generated binary key is then deployed on the centralized server. For example, the two sets of keys generated separately and then the printout of the keys generated are kept in an envelope and sealed, marking the envelope with Key High, authentication site name, and code length. Similarly, for the envelope for Key Low, mark the envelope with Key Low, authentication site name, and code length, and then both envelopes are saved in a joint locker. Thus, in order to have access to the code, both keys are required. Therefore, adding more security to the system.
Figure 7 is a flow diagram of code ordering process in a supply chain based track and trace system according to an embodiment of the present invention. The process comprises receiving a code request from an ERP interface, web interface, or consumers on a code ordering system. The code ordering system allocates a new lot comprising a set of entries to store the identity of the received request such as lot identity ID, lot size, characters, authentication site and others. The process includes generation of codes using format-preserving encryption (FPE) and encryption using a binary key pointer said binary key pointer is generated by compilation of a pair of encryption keys, wherein said pair of encryption keys are a Key High and a Key Low that are provided to two different vaults . The process includes a counter table in a database that manages a ‘lot identifier’ values for the codes, and a begin counter and end counter values of codes to generate code values and also manages a bin pointer key, values having a key length to store and distribute a compiled set of information containing the authentication site. The code length and bin pointer are two different sets of values in a secure database which can be of multiple length and also for each site ID in a counter table space has its own unique set of bin pointers. Further a server manages generation of authentication site at the time when request for creating a new authentication site is received that fills the authentication site entries into the secure database.
An example of filling the 'counter table' column in the secure database is provided below. This example discloses the process to store the binary pointer key generated after compiling authentication site code and combining both distinct keys. The column includes the following fields to manage and distribute the compilation code:
Code_length pointer max_used site_id checksum ssid bin_ptr update_ts
7 COUNTERS_1_7 400 1 0 2 bin_1_2
Therefore, the present invention provides a supply chain based track and trace system that enables the complete tracking of products through the supply chain for detecting if there is any counterfeit product or if a product is diverted through the grey market.
Many modifications and other embodiments of the invention set forth herein will readily occur to one skilled in the art to which the invention pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
,CLAIMS:CLAIMS
We claim:
1. A system (100) to track and trace a product or package in supply chain comprising:
a. a code generation module (1) configured to generate a set of codes;
b. a serialization module (2) configured to request and receive the codes;
c. the package or product having said code printed on it by said serialization module (2);
d. a track and trace module (3) configured to track and authenticate the product in supply chain;
e. a consumer authentication module (4) configured to authenticate the product at consumer end;
f. a recording module (5) configured to store and analyse the data related to the product tracking and authentication; and
g. a centralized server;
wherein,
said serialization module (2) is configured to initiate request for a set of codes to be generated by the code generation module (1);
said code generation module (1) is configured to generate said set of codes of variable length using format-preserving encryption (FPE) process;
said code generation module (1) is configured to generate a set of counters, and generate set of codes by encrypting the set of counters using a binary key pointer, wherein the binary key pointer is generated by compilation of a pair of encryption keys, said pair of keys comprises a Key High and a Key Low generated for each code length of said generated set of codes and said pair of keys subsequently being provided to two different key vaults;
said code generation module (1) is configured to transfer said set of encrypted codes to said serialization module (2);
said serialization module (2) is configured to receive the set of encrypted codes as a part of barcodes or 2D codes to be printed on package or product for authentication at a given authentication site;
said track and trace module (3) is configured to authenticate the product in supply chain by decrypting said set of encrypted codes;
said track and trace module (3) is further configured to authenticate a given destination of the product in supply chain by decrypting said set of encrypted codes;
said consumer authentication module (4) is configured to decrypt and verify said set of encrypted codes on said printed codes on the package enabling verification by notification medium including SMS, internet messaging and/or scanning; and
said centralized server is configured to communicate with said modules (1, 2, 3, 4, 5) over a communication network.
2. The system as claimed in claim 1, wherein said set of code comprises alphanumeric characters and the code length comprises up to 20 characters.
3. The system as claimed in claim 1, wherein said generation of set of codes comprises allocating a lot identification value, a total lot size for an order of a plurality of products, begin and end counter values for the codes and generating the plurality of authentication codes based on the lot identification value and the total lot size, and updating a counter table in the code generation module.
4. The system as claimed in claim 1, wherein said serialization module (2) aggregates the set of codes in a multi-level configuration for a multi-level packaging comprising multiple units of product in a given packaging.
5. The system as claimed in claim 1, wherein said consumer authentication module (4) detects the encrypted code printed on the package through the communication network including scanning, SMS, internet messaging, and alike, along with customizable verification responses.
6. The system as claimed in claim 1, wherein said track and trace module (3) operates through the centralized server supported by a mobile application to authenticate a product.
7. A method for tracking and tracing a product or packaging in a supply chain, the method comprising the steps of:
a) initiating a request for a set of codes;
b) generating of set of counters;
c) encrypting the set of counters generated in step b) to generate codes of variable length;
d) receiving the set of encrypted codes of step c) and creating a bar code or 2D code;
e) printing said bar code/2D code of step d) on a package to be tracked and traced;
f) scanning said printed bar code/2D code; and
g) authenticating the product and/or destination at a given authentication site by decrypting the set of codes in code scanned in step g);
wherein,
said set of codes are of variable length;
said set of codes are generated using format-preserving encryption (FPE) process;
said set of counters are encrypted using a binary key pointer wherein the binary key pointer is generated by compilation of a pair of encryption keys, said pair of keys are a Key High and a Key Low generated for each code length of said generated set of codes;
said pair of keys are provided to two different key vaults; and
said set of encrypted codes forms a part of the barcodes or 2D codes to be printed on the package for authentication at a given authentication site.
8. The method as claimed in claim 7, wherein steps of generating the set of codes comprises: allocating a lot identification value, a total lot size for an order of a plurality of products, begin and end counter values for the codes and generating the plurality of authentication codes based on the lot identification value and the total lot size, and updating a counter table in the code generation module.
9. The method as claimed in claim 7, wherein said set of code comprises alphanumeric characters in the code and the length of the code is up to 20 characters.
10. The method as claimed in claim 7, wherein said set of encrypted codes are generated by a code generation module (1).
11. The method as claimed in claim 7, wherein creation of the bar code or 2D code having encrypted set of codes is performed by a serialization module (2).
12. The method as claimed in claim 7, wherein said scanning of the bar code/ 2D code printed on the package is performed by a code scanning equipment at an authentication site.
13. The method as claimed in claim 7, wherein said authentication of said bar code/ 2D code printed on the package is performed by decrypting said set of encrypted codes using a track and trace module (3).
| # | Name | Date |
|---|---|---|
| 1 | 202311019514-STATEMENT OF UNDERTAKING (FORM 3) [21-03-2023(online)].pdf | 2023-03-21 |
| 2 | 202311019514-PROVISIONAL SPECIFICATION [21-03-2023(online)].pdf | 2023-03-21 |
| 3 | 202311019514-FORM 1 [21-03-2023(online)].pdf | 2023-03-21 |
| 4 | 202311019514-FIGURE OF ABSTRACT [21-03-2023(online)].pdf | 2023-03-21 |
| 5 | 202311019514-DRAWINGS [21-03-2023(online)].pdf | 2023-03-21 |
| 6 | 202311019514-DECLARATION OF INVENTORSHIP (FORM 5) [21-03-2023(online)].pdf | 2023-03-21 |
| 7 | 202311019514-Proof of Right [17-05-2023(online)].pdf | 2023-05-17 |
| 8 | 202311019514-FORM-26 [17-05-2023(online)].pdf | 2023-05-17 |
| 9 | 202311019514-APPLICATIONFORPOSTDATING [21-03-2024(online)].pdf | 2024-03-21 |
| 10 | 202311019514-ENDORSEMENT BY INVENTORS [04-04-2024(online)].pdf | 2024-04-04 |
| 11 | 202311019514-DRAWING [04-04-2024(online)].pdf | 2024-04-04 |
| 12 | 202311019514-COMPLETE SPECIFICATION [04-04-2024(online)].pdf | 2024-04-04 |
| 13 | 202311019514-Request Letter-Correspondence [19-11-2024(online)].pdf | 2024-11-19 |
| 14 | 202311019514-Power of Attorney [19-11-2024(online)].pdf | 2024-11-19 |
| 15 | 202311019514-Form 1 (Submitted on date of filing) [19-11-2024(online)].pdf | 2024-11-19 |
| 16 | 202311019514-Covering Letter [19-11-2024(online)].pdf | 2024-11-19 |