WO2021174302A1 - A method and system for indicating the end of a supply chain - Google Patents

A method and system for indicating the end of a supply chain Download PDF

Info

Publication number
WO2021174302A1
WO2021174302A1 PCT/AU2021/050183 AU2021050183W WO2021174302A1 WO 2021174302 A1 WO2021174302 A1 WO 2021174302A1 AU 2021050183 W AU2021050183 W AU 2021050183W WO 2021174302 A1 WO2021174302 A1 WO 2021174302A1
Authority
WO
WIPO (PCT)
Prior art keywords
machine readable
readable indicia
supply chain
product
personal device
Prior art date
Application number
PCT/AU2021/050183
Other languages
French (fr)
Inventor
James Williamson
Rhys WILLIAMSON
Original Assignee
Orijin Plus Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2020900659A external-priority patent/AU2020900659A0/en
Application filed by Orijin Plus Pty Ltd filed Critical Orijin Plus Pty Ltd
Publication of WO2021174302A1 publication Critical patent/WO2021174302A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K5/00Methods or arrangements for verifying the correctness of markings on a record carrier; Column detection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10544Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • G06Q10/0833Tracking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/80Recognising image objects characterised by unique random patterns
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • This disclosure relates to a method and system for indicating the end of a supply chain. In particular, to the indication of a product package being unpacked by a consumer.
  • indicia may include holograms, serial numbers, and watermarks.
  • Digital technologies are increasingly employed for supply chain tracking and the demonstration of authenticity.
  • the provenance of a product may be monitored through the use of barcodes and/or radio-frequency identification (RFID) tags.
  • RFID radio-frequency identification
  • counterfeiters have devised means of counteracting and exploiting these physical and digital technologies.
  • physical indicia may be analysed and sufficiently imitated to deceive consumers.
  • counterfeiters may include their own barcodes and/or RFID tags that use or mimic the authentic supply chain data. Additionally, counterfeiters may also implant malicious code within the barcodes and/or RFID tags that may be used to deceive supply chain participants into providing private data and/or installing malicious software. This deception may be in the form of phishing uniform resource locators (URLs) associated to barcodes and RFID cloning/spoofing.
  • URLs uniform resource locators
  • a method for indicating the end of a supply chain where a consumer can use their personal device to read two machine readable indicia to confirm consumption of a product.
  • the two machine readable indicia is associated to a blockchain, representing the various steps of a supply chain. This ensures that all steps of the supply chain are accounted for in a secure digital ledger, disallowing effective counterfeiting of products and allowing consumers to verify the authenticity of the product.
  • a method for indicating the end of a supply chain comprising: interfacing a blockchain comprising multiple blocks representative of multiple steps in the supply chain, the multiple blocks being associated with a first machine readable indicia provided with the product, the first machine readable indicia being readable along the supply chain; reading, with a personal device, the first machine readable indicia; reading, with the personal device, a second machine readable indicia provided with the product, the second machine readable indicia being concealed along the supply chain and readable at the end of the supply chain; based on the first machine readable indicia and the second machine readable indicia, authorising the personal device to access the blockchain; creating a final record in the blockchain based on the first machine readable indicia or the second machine readable indicia or both to indicate the end of the supply chain.
  • authorising the personal device comprises determining that the second machine readable indicia contains an authorisation code associated with the first machine readable indicia.
  • authorising the personal device comprises determining that the first machine readable indicia and the second machine readable indicia have identical code to verification code stored on a server.
  • the final record contains a datum confirming consumption of the product.
  • the final record contains a datum comprising a timestamp of the personal device.
  • the final record contains a datum comprising a geolocation of the personal device.
  • the list of information comprises a time stamp, a geolocation, and a supply chain participant of each associated block of the blockchain.
  • the second machine readable indicia is concealed on an inner surface of a product package containing the product. [0016] In an embodiment, the second machine readable indicia is made readable by removing a cover of the package.
  • the second machine readable indicia is made readable by removing the product from the product package.
  • the end of the supply chain is characterised by a non- reversible physical operation to the product packaging.
  • the non-reversible physical operation is the alteration of a tamper-evident device.
  • the tamper-evident device is a band, a label or a seal.
  • the product is an agricultural product.
  • the product is a processed agricultural product.
  • the method further comprises: determining, by the server, a user account associated to the personal device; and issuing a token to the user account.
  • the token includes a digital representation of value that is associated to the user account.
  • a system for indicating the end of a supply chain comprising: a product provided with a first machine readable indicia and a second machine readable indicia; wherein the first machine readable indicia is associated with a blockchain comprising multiple blocks representative of multiple steps in the supply chain, the first machine readable indicia is readable at all steps of the supply chain; and wherein the second machine readable indicia concealed along the supply chain and readable at the end of the supply chain; and a personal device configured with an optical sensor and a processor; wherein the processor is programmed to: read the first machine readable indicia; read the second machine readable indicia; communicate with a server; receive authorisation from the server to access the blockchain based upon the first machine readable indicia and the second machine readable indicia; and create a final record in the blockchain based on the first machine readable indicia or the second machine readable indicia or
  • the processor is further programmed to display a list of information associated with the blockchain; wherein the list of information indicates the multiple steps in the supply chain and a point of origin.
  • the product is an agricultural product.
  • the product is a processed agricultural product.
  • the product is housed within a product package.
  • the product package is configured with a tamper-evident device.
  • the personal device is further configured with a transceiver, and the processor is further programmed to communicate with a server, wherein the server determines whether a user account is associated with the personal device and causes a token to be issued to the user account.
  • Fig. 1 illustrates a supply chain according to an embodiment of the disclosure.
  • Fig. 2 illustrates a system for indicating the end of the supply chain.
  • FIG. 3 is an schematic illustration of a first embodiment of a product package.
  • Fig. 4 A is a plan view of a second embodiment of the product package provided with a first machine readable indicia.
  • Fig. 4B is a plan view of the second embodiment of the product package with the cover removed.
  • Fig. 4C is a plan view of the second embodiment of the product package with a second machine readable indicia being revealed.
  • Fig. 5 illustrates a flow diagram of a method for indicating an end of the supply chain.
  • Fig. 1 illustrates an exemplary embodiment of a supply chain 10.
  • the supply chain 10 shows a journey of a product, in the form of an agricultural product 12 or a processed agricultural product, from a point of origin to a point of consumption.
  • the journey may be generally outlined as the agricultural product 12 or processed agricultural product being initially processed at a processing facility 14 before being packaged to form a packaged product 16.
  • the packaged product 16 may be subsequently delivered, via a form of transportation 18, to a distribution centre 20 to await order fulfilment.
  • a retailer 22 may request the packaged product 16 to be delivered from distribution centre 20 to fill an inventor order, prior to the sale of the packaged product 16 to a consumer 24.
  • the packaged product 16 may be considered to be consumed when the consumer 24 unpacks the product for subsequent consumption 26.
  • the supply chain 10 may enable tracking of the product through the various steps of the supply chain 10. Tracking may be achieved by recording and sharing, at each step of the supply chain 10, a set of data.
  • the set of data may include information in the form of a datum, such as a timestamp, a geolocation, an identifier of a supply chain participant, and processing notes. Additionally, tracking may be electronic, wherein devices configured with a processor, such as smart devices 28, may be used to record the set of data and store it in a repository.
  • the repository may be stored externally, such as a database on a server, and may be configured to be accessed by participants of the supply chain 10 to monitor the progress of the product and note any product related critical information. Furthermore, the repository may be in the form of a distributed ledger, wherein the repository is spread across several devices.
  • the repository may be a blockchain.
  • the blockchain may comprise multiple blocks that are each representative of a step in the supply chain 10.
  • Methods in which electronic records are created on the repository may involve generating entries on a database or generating records on a distributed ledger. These records may be referred to by the participants of the supply chain 10. This ensures that product provenance may be easily traced and any discrepancies may be readily highlighted.
  • Data associated with the supply chain 10 may be secured through the application of access control, wherein the smart device 28 used by each supply chain participants may be granted authorisation to access and write content to the repository. Additionally, each smart device 28 may be granted authorisation to access and write content in relation to the specific step in the supply chain that is it associated with.
  • the smart device 28 associated with the processing facility 14 may be representative of the start of the supply chain 10 or the point of origin.
  • the smart device 28 may create a record containing data indicating a start of the supply chain and/or a point of origin.
  • the smart device of the consumer 24, in the form of a personal device 28A may be representative of the end of the supply chain 10.
  • the personal device 28A may create a final record containing data indicating an end of the supply chain.
  • the personal device 28A may not be initially authorised to access and write content to the shared repository. As such, it is advantageous to have a method and system to enable the personal device 28A to be authorised to access the repository, which in turn enables the indication of the end of a supply chain.
  • Fig. 2 illustrates an exemplary system 30 for indicating the end of a supply chain 10.
  • the system 30 can comprise a product 16, in a product package, provided with a first machine readable indicia 32 and a second machine readable indicia 34.
  • the first machine readable indicia 32 may be associated with a blockchain 36 comprising multiple blocks representative of multiple steps in the supply chain 10.
  • the first machine readable indicia 32 may be readable at all steps of the supply chain 10.
  • the second machine readable indicia 34 may be concealed along the supply chain 10 and may be readable at the end of the supply chain 10.
  • the first machine readable indicia 32 and the second machine readable indicia 34 are in the form of a quick response (QR) code.
  • QR quick response
  • other forms of machine readable indicia may be used. Examples include, data matrix barcodes, MaxiCodes, and high capacity colour barcodes.
  • the blockchain 36 may be substituted with another form of shared database or digital ledger system.
  • the blockchain 36 may comprise a primary blockchain and one or more sidechains.
  • the blockchain 36 may include a sidechain indicative of the life cycle of the initial product 12, and another sidechain indicative of the processing, distribution and consumption of the product.
  • a smart device 28, in the form of a personal device 28A of a consumer 24, is configured with an optical sensor and a processor.
  • the processor may be programmed to read the first machine readable indicia 32 and the second machine readable indicia 34.
  • the processor after reading the first and second indicia 32, 34, may authorise the personal device 28A to access the blockchain 36 based upon the first machine readable indicia 32 and the second machine readable indicia 34. If the personal device 28A is authorised, the processor may create a final record in the blockchain 36, based on the first machine readable indicia 32, the second machine readable indicia 34, or both to indicate the end of the supply chain.
  • the personal device 28A may read the first machine readable indicia 32, which has a first unique code, and the second machine readable indicia 34, which as a second unique code.
  • the personal device 28A after extracting the first unique code and the second unique code, may generate a private key.
  • the personal device 28A may send a request to create the final record in the blockchain 36 with the private key, wherein the private key is used to verify the authenticity of the request. After the request to create the final record in the blockchain 36 is verified, the personal device 28A is authorised to create the final record in the blockchain 36.
  • the final record may be created based upon whether the blockchain 36 associated with the first machine readable indicia 32 does not contain an existing final record.
  • the final record may be created based upon whether the second machine readable indicia 34 has been previously read.
  • the final record may be created based upon whether the first machine readable indicia 32 and second machine readable indicia 34 were sequentially read by the same personal device 28A.
  • access to the blockchain 36 entails that the smart device 28 and the personal device 28A are permissioned to read, write, and add content to the blockchain 36.
  • the processor of the smart device 28 or the personal device 28A is further programmed to display data associated with the blockchain.
  • the list of information providing an indication of the multiple steps in the supply chain and a point of origin.
  • the smart device 28 or the personal device 28 A is further configured with a transceiver for facilitating communication with a server.
  • the server facilitating functions related to authorisation of the smart device 28 or the personal device 28A.
  • the personal device 28A may transmit the access code to the server for verification.
  • the personal device 28A may transmit code from both the first machine readable indicia 32 and the second machine readable indicia 34 to the server to determine whether the codes are identical to associated code stored on the server for verification.
  • the server may be configured to determine whether a user account is associated to the personal device 28A. If the user account is associated to the personal device 28A, the server issues a token to the user account.
  • the token may be a digital representation of value.
  • the system 30 enables any consumer 24 to review and participate in the recordal of data to the supply chain 10. This advantageously creates a new avenue of counterfeit security and provides an avenue for the consumer to determine the authenticity of the product.
  • the consumer 24, using the personal device 28A may be able to review the product history and to confirm both the legitimacy of the supply chain 10 and the point of origin. Additionally, the consumer 24 may subsequently create the final record of the supply chain 10, creating a record on the blockchain 36 indicating that the product has been consumed and the supply chain has ended. Once the consumer 24 has created the final record on the blockchain 36, counterfeiters are substantially denied the opportunity to use the machine readable indicia on fraudulent products. This is due to consumers being able to review the blockchain, associated with the machine readable indicia, and note that the supply chain has ended even if the product package hasn’t been compromised.
  • An additional advantage provided by the system 30 is the collection of valuable supply chain data and consumer data.
  • the producers may monitor the records of the repository to determine market research information, such as average time from production to consumption, the geolocations in which the product is most popular, and even the typical time of consumption of the products.
  • Product packages are typically used to house products.
  • the product package may be used to achieve various goals, such as improved presentation, the display of brand artefacts, and the preservation of the product.
  • the design of product packages may vary in shape and dimensions.
  • product packages are typically formed from two separate portions comprising a body for placement of the product, and a cover for containing the product within the space defined between the body and the cover.
  • Fig. 3 and Figs. 4A - 4C illustrate two embodiments of product packages that may be used in the system 30.
  • Both product packages are provided with a first machine readable indicia 32 and a second machine readable indicia 34.
  • the first machine readable indicia 32 being placed on a surface of the product packages such that it is readable at all steps of the supply chain.
  • the second machine readable indicia 34 is placed on a surface of the product package, such that it is concealed along the supply chain and is only readable at the end of the supply chain.
  • the first embodiment of the product package is in the form of a box-like container 40.
  • the container 40 has a hollow body 40A with an opening 41 to allow placement of the product into the hollow body 40A.
  • a removable cover 40B may be used to cover the opening 41.
  • the first machine readable indicia 32 may be placed on the upper surface of the removable cover 40B. This enables the first machine readable indicia 32 to be readable at all steps of the supply chain. However, it may also be located at any other external surface of the hollow body 40A or the removable cover 40B.
  • the second machine readable indicia 34 may be placed on an internal surface of the hollow body 40A. This enables the second machine readable indicia 34 to be concealed along the supply chain when the removable cover 40B is fitted to the hollow body 40A.
  • the second machine readable indicia 34 is only made readable at the end of the supply chain when a consumer 24 removes the removable cover 40B in order to gain access to the product.
  • the second machine readable indicia 34 may be placed on any internal surface of either the hollow body 40A or the cover 40B.
  • the second embodiment of the product package is in the form of a tray 42A being covered by a plastic film 42B.
  • the tray 42A is shown to be of a rectangular shape and of a shallow depth for holding the product 44. It may be evident that the tray 42A may be of any shape and depth suitable for holding the product 44.
  • the plastic film 42B is used to cover the top of the tray 42A such that the product 44 is substantially confined to a space defined between the tray 42A and the inner surface of the plastic film 42B.
  • the plastic film 42B may have adhesive properties to assist in sealing any gaps between the tray 42A and the plastic film 42B and preventing the plastic film 42B from separating from the tray 42A.
  • the first machine readable indicia 32 may be placed on the upper surface of the plastic film 42B. This enables the first machine readable indicia 32 to be readable at all steps of the supply chain 10. It would be appreciated that the first machine readable indicia 32 may also be placed on the lower surface of the tray 42A which may not be covered by the plastic film 42B .
  • the second machine readable indicia 34 may be placed on the upper surface of the plastic tray 42A, as shown in Fig. 4C, and concealed by the product 44, as shown in Fig. 4B. The product 44 is subsequently covered by the plastic film 42B, as shown in Fig. 4A. This enables the second machine readable indicia 34 to be concealed at all steps of the supply chain until the plastic film 42B and the product 44 are removed from the tray 42 A.
  • the second machine readable indicia 34 may be obscured from view with a temporary or semi permanent cover.
  • the temporary or semi-permanent cover may be in the form of an adhesive label or other removable cover.
  • the temporary or semi-permanent cover may be in the form of a scratch off opaque substance.
  • the product package may be configured with a tamper-evident device for demonstrating consumption of the product.
  • the alteration of the tamper-evident device demonstrates a non-reversable physical operation which is indicative of product consumption.
  • Examples of tamper-evident devices may include breakable seals, tape seals, and heat shrink wraps.
  • the tamper-evident device may be integral to the product package.
  • the second embodiment of the product package 42 shown by Figs. 4A - 4C involves the plastic film 42B covering both the product 44 and the tray 42A.
  • the plastic film 42B having adhesive properties, may be configured to be of small thickness. As such, the plastic film 42B may be substantially difficult to remove from the product 44 and the tray 42A without tearing the plastic film 42B .
  • the positioning of the second machine readable indicia 34 provides the advantage of ensuring that the product has reached the end of the supply chain 10 prior to the creation of the final record on the blockchain 36. This substantially reduces the likelihood of accidental creation of the final record without the product rendered consumed.
  • the application of tamper-evident devices complement the positioning of the second machine readable indicia 34. Smart device
  • the smart device 28 comprises at least one processor, computer memory and a data storage.
  • the smart device further comprises network interface hardware and software, enabling the smart device to communicate with one or more network enabled computing devices over a communications network, such as the internet or an intranet. Additionally, the smart device comprises a user interface configured to receive input and provide an output in response.
  • the at least one processor of the smart device 28 is configured to execute program code stored in the computer memory, causing the smart device 28 to function according to the described methods.
  • the at least one processor may be one or more microprocessors, central processing units or other processors capable of reading and executing program code.
  • the computer memory may comprise one or more volatile or non-volatile memory type, such as random access memory (RAM), read-only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read-only memory
  • flash memory flash memory.
  • the computer memory is configured to store program code accessible by the at least one processor. The execution of the stored program code by the one or more processors configures the smart device 28 to perform certain functions.
  • the user interface is configured to receive input from the supply chain participant.
  • the user interface is configured to provide an output.
  • the output comprises a visual output which is displayed on a smart device display.
  • the smart device display may be a liquid crystal display (LCD), organic light emitting diode (OLED) display, or any other suitable visual display.
  • the computer memory stores a supply chain application.
  • the supply chain application may comprise program code and/or an authorisation code for access to the repository. Executing the program code by the at least one processor may generate the user interface and enable the supply chain participant to provide input required for creating records in the repository and processing the product at their associated step in the supply chain.
  • the personal device 28A used by the consumer 24 may be a derivative of the smart device 28.
  • the personal device 28 A may be a multi-purpose mobile computing device, such as a smart phone.
  • the personal device 28A further comprises an optical sensor configured for reading machine readable indicia.
  • the personal device 28A comprises network interface hardware and software configured to communicate over a wireless communication channel, such as a wireless internet connection.
  • the personal device 28A comprises a user interface for receiving input from the consumer 24.
  • the user interface is configured to provide an output in response to the input from the consumer 24.
  • the output may be in the form of characters being displayed upon a graphics display of the personal device 28A.
  • the computer memory of the personal device 28A may store the supply chain application.
  • the embodiment of the supply chain application for the personal device 28A may comprise program code to generate a user interface for the personal device 28A and initiate the optical sensor. This enables the consumer 24 to use the personal device 28A to provide input for reading the first machine readable indicia 32, the second machine readable indicia 34, and authorising access to the repository. Subsequently, the smart device 28A may be authorised to create a final record on the repository based upon the first machine readable indicia, 32, the second machine readable indicia 34 or both at the end of the supply chain 10.
  • the repository comprises a database housed on an external server connected over the communications network.
  • the database may also exist as a distributed ledger, in which the database exists on a plurality of distributed ledger systems connected over the communications network.
  • One of more of the distributed ledger systems may store a complete copy of the database.
  • one or more of the distributed ledger systems may store a partial copy of the database.
  • the plurality of the distributed ledger systems share and synchronise their copies of the data with each other over the communication network.
  • the plurality of distributed ledger systems may implement a consensus mechanism to achieve agreement on which copy is shared and synchronised.
  • the repository comprises a blockchain 36.
  • the blockchain 36 is a subset of distributed ledger technology.
  • the blockchain 36 comprises two or more blocks that are linked together, adhering to a predetermine protocol.
  • Each block is a record akin to a container for data.
  • the data may comprise a cryptographic hash of a previous block, a timestamp and/or ledger data.
  • the ledger data may include one or more transaction records. These transaction records may represent the passing of the product through the multiple steps of the supply chain 10.
  • the blockchain 36 may comprise a primary blockchain and one or more sidechains.
  • the repository may be configured to require authorisation to create records on the database or the blockchain 36.
  • Authorisation may be granted by administrators of the repository.
  • Authorisation may be in the form of login and passwords, or the matching of access codes provided by the first and second machine readable indicia 32, 34.
  • Fig. 5 shows a flow diagram of a method for indicating the end of a supply chain 10 shown in Fig. 1.
  • the method may be implemented by the system shown in Fig. 2.
  • the method for indicating the end of the supply chain 10 comprises initially interfacing a blockchain comprising multiple blocks representative of multiple steps in the supply chain 10.
  • the multiple blocks are associated with a first machine readable indicia 32 provided with the product, wherein the first machine readable indicia 32 is readable along the multiple steps of the supply chain 10.
  • the method comprises reading, with the either the smart device 28 or the personal device 28A, the first machine readable indicia 32.
  • the first machine readable indicia 32 contains code instructing the smart device 28 or the personal device 28A to proceed to step 48, wherein a list of information associated with the blockchain 36 is displayed on the personal device 28A.
  • the list of information indicates the multiple steps in the supply chain and a point of origin.
  • the list of information comprises relevant data such as a time stamp, a geolocation , and a supply chain participant of each associated block of the blockchain.
  • This provides the advantage of the consumer and the supply chain participant to know the history of the product and to verify the authenticity of the recorded information. This enables the identification of counterfeit products and may assist in determining when and where in the supply chain 10 the counterfeit products were introduced.
  • the first machine readable indicia 32 may contain additional code instructing the smart device 28 or the personal device 28A to establish a communication link with a server prior to proceeding to step 48.
  • the server may host and run the supply chain software, it may provide the functions required for authorising the personal device 28A through an application programming interface, and/or may act as a proxy for the personal device 28A to access the blockchain 36.
  • an authorisation request is displayed on either the smart device 28 or the personal device 28A.
  • the smart device 28 if the smart device 28 is being used, it will already have authorisation to access the blockchain 36 in the computer memory. This will cause the smart device 28 to proceed to step 60, wherein it can create one or more intermediate records on the blockchain 36. The one or more intermediate records being representative of data associated with that particular step of the supply chain.
  • the personal device 28A if the personal device 28A is being used, it will not have authorisation to access the blockchain 36. This will cause the personal device 28A to proceed to the decision point 54
  • the personal device 28A is required to have access to the authorisation code found in the second machine readable indicia 34.
  • the second machine readable indicia 34 is concealed along the supply chain 10 and is only readable at the end of the supply chain 10.
  • the end of the supply chain 10 is defined as the point in which the consumer 24 has consumed the product for domestic or commercial use. This point is typically characterised by a non-reversible physical operation to the product packaging, wherein the product package is damage or otherwise marred during unpacking of the product. Additionally, tamper-evident devices, such as a band, various seals or wrapping may also require alteration/destmction in order to access the product within the product package.
  • the second machine readable indicia 34 is concealed on an inner surface of the product package, requiring the consumer 24 to remove the cover of the product package in order to access the second machine readable indicia 34.
  • the personal device 28A reads the uncovered second machine readable indicia 34. Based upon the code of the first machine readable indicia 32 and that of the second machine readable indicia 34, the personal device 28A may be authorised to access the blockchain 36. In an embodiment, authorising the personal device 28A comprises determine that the second machine readable indicia 34 contains an authorisation code associated with the first machine readable indicia 32. In another embodiment, authorising the personal device 28A comprises determine that the first machine readable indicia 32 and the second machine readable indicia 34 have identical code to verification code found on a server.
  • the personal device 2A creates a final record in the blockchain based on the first machine readable indicia 32, the second machine readable indicia 34 or both to indicate the end of the supply chain 10.
  • the final record may include additional information in the form of a datum confirming consumption of the product.
  • the final record may include additional information in the form of consumption data in the form of a timestamp and/or a geolocation based upon the personal device 28A.
  • the personal device 28A may be in communication with a server that contains data relating to prospective user account associated to consumers of the product.
  • the server upon communicating with the personal device 28A through the supply chain application stored on the computer memory of the personal device 28A, may derive that there is a user account associated to the personal device 28A.
  • the user account may be similar to a loyalty program offered by many retailers or service providers.
  • a token may be issued to the user account upon recordal of the consumption of the product on the blockchain 36.
  • the token which may be in the form of a loyalty point or otherwise, may have a digital representation of value associated to the user account. This digital representation of value may be a crypto currency, discount on future purchase, or even a cash rebate.
  • the user account may be associated with various types of products that use the method for indicating the end of the supply chain.
  • the user account may be configured to accumulate the tokens issued from the creation of the final records from the various products.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Electromagnetism (AREA)
  • Computer Security & Cryptography (AREA)
  • Operations Research (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Human Resources & Organizations (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present disclosure relates to methods and systems for indicating the end of a supply chain. An example method may comprise: interfacing a blockchain comprising multiple blocks representative of multiple steps in the supply chain, the multiple blocks being associated with a first machine readable indicia provided with the product, the first machine readable indicia being readable along the supply chain; reading, with a personal device, the first machine readable indicia; reading, with the personal device, a second machine readable indicia provided with the product, the second machine readable indicia being concealed along the supply chain and readable at the end of the supply chain; based on the first machine readable indicia and the second machine readable indicia, authorising the personal device to access the blockchain; creating a final record in the blockchain based on the first machine readable indicia or the second machine readable indicia or both to indicate the end of the supply chain. An example system for indicating the end of the supply chain is also disclosed.

Description

A Method and System for Indicating the End of a Supply Chain
Technical Field
[0001] This disclosure relates to a method and system for indicating the end of a supply chain. In particular, to the indication of a product package being unpacked by a consumer.
Background
[0002] Counterfeiting of product packaging is a challenge that many producers encounter. Third parties that sell fraudulent products, using the guise of a reputable producer, create a variety of adverse effects. These effects may lead to the loss of brand equity, a reduction in consumer confidence, and a loss of sales/revenue for the producer.
[0003] Several methods have been developed to thwart counterfeiting, which can be broadly separated into physical indicia and digital technologies. The placement of indicia on product packaging has been traditionally used to denote authenticity and/or provenance. These indicia may include holograms, serial numbers, and watermarks. Digital technologies are increasingly employed for supply chain tracking and the demonstration of authenticity. The provenance of a product may be monitored through the use of barcodes and/or radio-frequency identification (RFID) tags.
[0004] Sophisticated counterfeiters have devised means of counteracting and exploiting these physical and digital technologies. In an example, physical indicia may be analysed and sufficiently imitated to deceive consumers. In another example, counterfeiters may include their own barcodes and/or RFID tags that use or mimic the authentic supply chain data. Additionally, counterfeiters may also implant malicious code within the barcodes and/or RFID tags that may be used to deceive supply chain participants into providing private data and/or installing malicious software. This deception may be in the form of phishing uniform resource locators (URLs) associated to barcodes and RFID cloning/spoofing.
[0005] Any discussion of documents, acts, materials, devices, articles or the like which has been included in the present specification is not to be taken as an admission that any or all of these matters form part of the prior art base or were common general knowledge in the field relevant to the present disclosure as it existed before the priority date of each of the appended claims.
Summary
[0006] There is provided a method for indicating the end of a supply chain where a consumer can use their personal device to read two machine readable indicia to confirm consumption of a product. In particular, the two machine readable indicia is associated to a blockchain, representing the various steps of a supply chain. This ensures that all steps of the supply chain are accounted for in a secure digital ledger, disallowing effective counterfeiting of products and allowing consumers to verify the authenticity of the product.
[0007] According to a first aspect, there is provided a method for indicating the end of a supply chain, the method comprising: interfacing a blockchain comprising multiple blocks representative of multiple steps in the supply chain, the multiple blocks being associated with a first machine readable indicia provided with the product, the first machine readable indicia being readable along the supply chain; reading, with a personal device, the first machine readable indicia; reading, with the personal device, a second machine readable indicia provided with the product, the second machine readable indicia being concealed along the supply chain and readable at the end of the supply chain; based on the first machine readable indicia and the second machine readable indicia, authorising the personal device to access the blockchain; creating a final record in the blockchain based on the first machine readable indicia or the second machine readable indicia or both to indicate the end of the supply chain.
[0008] In an embodiment, authorising the personal device comprises determining that the second machine readable indicia contains an authorisation code associated with the first machine readable indicia.
[0009] In an embodiment, authorising the personal device comprises determining that the first machine readable indicia and the second machine readable indicia have identical code to verification code stored on a server.
[0010] In an embodiment, the final record contains a datum confirming consumption of the product.
[0011] In an embodiment, the final record contains a datum comprising a timestamp of the personal device.
[0012] In an embodiment, the final record contains a datum comprising a geolocation of the personal device.
[0013] In an embodiment, after reading the first machine readable indicia: displaying, on the personal device, a list of information associated with the blockchain; wherein the list of information indicates the multiple steps in the supply chain and a point of origin.
[0014] In an embodiment, the list of information comprises a time stamp, a geolocation, and a supply chain participant of each associated block of the blockchain.
[0015] In an embodiment, the second machine readable indicia is concealed on an inner surface of a product package containing the product. [0016] In an embodiment, the second machine readable indicia is made readable by removing a cover of the package.
[0017] In an embodiment, the second machine readable indicia is made readable by removing the product from the product package.
[0018] In an embodiment, the end of the supply chain is characterised by a non- reversible physical operation to the product packaging.
[0019] In an embodiment, the non-reversible physical operation is the alteration of a tamper-evident device.
[0020] In an embodiment, the tamper-evident device is a band, a label or a seal.
[0021] In an embodiment, the product is an agricultural product.
[0022] In an embodiment, the product is a processed agricultural product.
[0023] In an embodiment, the method further comprises: determining, by the server, a user account associated to the personal device; and issuing a token to the user account.
[0024] In an embodiment, the token includes a digital representation of value that is associated to the user account.
[0025] According to a second aspect, there is provided a system for indicating the end of a supply chain, the system comprising: a product provided with a first machine readable indicia and a second machine readable indicia; wherein the first machine readable indicia is associated with a blockchain comprising multiple blocks representative of multiple steps in the supply chain, the first machine readable indicia is readable at all steps of the supply chain; and wherein the second machine readable indicia concealed along the supply chain and readable at the end of the supply chain; and a personal device configured with an optical sensor and a processor; wherein the processor is programmed to: read the first machine readable indicia; read the second machine readable indicia; communicate with a server; receive authorisation from the server to access the blockchain based upon the first machine readable indicia and the second machine readable indicia; and create a final record in the blockchain based on the first machine readable indicia or the second machine readable indicia or both to indicate the end of the supply chain.
[0026] In an embodiment, the processor is further programmed to display a list of information associated with the blockchain; wherein the list of information indicates the multiple steps in the supply chain and a point of origin.
[0027] In an embodiment, the product is an agricultural product.
[0028] In an embodiment, the product is a processed agricultural product.
[0029] In an embodiment, the product is housed within a product package.
[0030] In an embodiment, the product package is configured with a tamper-evident device.
[0031] In an embodiment, the personal device is further configured with a transceiver, and the processor is further programmed to communicate with a server, wherein the server determines whether a user account is associated with the personal device and causes a token to be issued to the user account. Brief Description of Drawings
[0032] A non-limiting example will now be described with reference to the following drawings:
[0033] Fig. 1 illustrates a supply chain according to an embodiment of the disclosure.
[0034] Fig. 2 illustrates a system for indicating the end of the supply chain.
[0035] Fig. 3 is an schematic illustration of a first embodiment of a product package.
[0036] Fig. 4 A is a plan view of a second embodiment of the product package provided with a first machine readable indicia.
[0037] Fig. 4B is a plan view of the second embodiment of the product package with the cover removed.
[0038] Fig. 4C is a plan view of the second embodiment of the product package with a second machine readable indicia being revealed.
[0039] Fig. 5 illustrates a flow diagram of a method for indicating an end of the supply chain.
Description of Embodiments
General terms
[0040] Throughout this specification the word "comprise", or variations such as "comprises" or "comprising", will be understood to imply the inclusion of a stated element, integer or step, or group of elements, integers or steps, but not the exclusion of any other element, integer or step, or group of elements, integers or steps. [0041] It should also be understood that, unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as "estimating" or "processing" or "computing" or "calculating", "optimizing" or "determining" or "displaying" or “maximising” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that processes and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
Overview of a supply chain
[0042] Fig. 1 illustrates an exemplary embodiment of a supply chain 10. The supply chain 10 shows a journey of a product, in the form of an agricultural product 12 or a processed agricultural product, from a point of origin to a point of consumption. The journey may be generally outlined as the agricultural product 12 or processed agricultural product being initially processed at a processing facility 14 before being packaged to form a packaged product 16. The packaged product 16 may be subsequently delivered, via a form of transportation 18, to a distribution centre 20 to await order fulfilment. A retailer 22 may request the packaged product 16 to be delivered from distribution centre 20 to fill an inventor order, prior to the sale of the packaged product 16 to a consumer 24. The packaged product 16 may be considered to be consumed when the consumer 24 unpacks the product for subsequent consumption 26.
[0043] It would be appreciated by a person skilled in the art that agricultural product can include goods such as crops, meat from livestock, and seafood. Additionally, processed agricultural product can include goods such as herbal supplements, milk powders, and wine. [0044] The supply chain 10 may enable tracking of the product through the various steps of the supply chain 10. Tracking may be achieved by recording and sharing, at each step of the supply chain 10, a set of data. The set of data may include information in the form of a datum, such as a timestamp, a geolocation, an identifier of a supply chain participant, and processing notes. Additionally, tracking may be electronic, wherein devices configured with a processor, such as smart devices 28, may be used to record the set of data and store it in a repository. The repository may be stored externally, such as a database on a server, and may be configured to be accessed by participants of the supply chain 10 to monitor the progress of the product and note any product related critical information. Furthermore, the repository may be in the form of a distributed ledger, wherein the repository is spread across several devices.
[0045] In an embodiment, the repository may be a blockchain. The blockchain may comprise multiple blocks that are each representative of a step in the supply chain 10.
[0046] Methods in which electronic records are created on the repository may involve generating entries on a database or generating records on a distributed ledger. These records may be referred to by the participants of the supply chain 10. This ensures that product provenance may be easily traced and any discrepancies may be readily highlighted.
[0047] Data associated with the supply chain 10 may be secured through the application of access control, wherein the smart device 28 used by each supply chain participants may be granted authorisation to access and write content to the repository. Additionally, each smart device 28 may be granted authorisation to access and write content in relation to the specific step in the supply chain that is it associated with.
[0048] The smart device 28 associated with the processing facility 14 may be representative of the start of the supply chain 10 or the point of origin. The smart device 28 may create a record containing data indicating a start of the supply chain and/or a point of origin. [0049] The smart device of the consumer 24, in the form of a personal device 28A, may be representative of the end of the supply chain 10. The personal device 28A may create a final record containing data indicating an end of the supply chain.
[0050] The personal device 28A may not be initially authorised to access and write content to the shared repository. As such, it is advantageous to have a method and system to enable the personal device 28A to be authorised to access the repository, which in turn enables the indication of the end of a supply chain.
System for indicating the end of a supply chain
[0051] Fig. 2 illustrates an exemplary system 30 for indicating the end of a supply chain 10. The system 30 can comprise a product 16, in a product package, provided with a first machine readable indicia 32 and a second machine readable indicia 34. The first machine readable indicia 32 may be associated with a blockchain 36 comprising multiple blocks representative of multiple steps in the supply chain 10. The first machine readable indicia 32 may be readable at all steps of the supply chain 10. The second machine readable indicia 34 may be concealed along the supply chain 10 and may be readable at the end of the supply chain 10.
[0052] In this embodiment of the system 30, the first machine readable indicia 32 and the second machine readable indicia 34 are in the form of a quick response (QR) code. However, it would be appreciated by the person skilled in the art that other forms of machine readable indicia may be used. Examples include, data matrix barcodes, MaxiCodes, and high capacity colour barcodes.
[0053] In another embodiment of the system 30, the blockchain 36 may be substituted with another form of shared database or digital ledger system.
[0054] In a further embodiment of the system 30, the blockchain 36 may comprise a primary blockchain and one or more sidechains. In an example, the blockchain 36 may include a sidechain indicative of the life cycle of the initial product 12, and another sidechain indicative of the processing, distribution and consumption of the product.
[0055] A smart device 28, in the form of a personal device 28A of a consumer 24, is configured with an optical sensor and a processor. The processor may be programmed to read the first machine readable indicia 32 and the second machine readable indicia 34. The processor, after reading the first and second indicia 32, 34, may authorise the personal device 28A to access the blockchain 36 based upon the first machine readable indicia 32 and the second machine readable indicia 34. If the personal device 28A is authorised, the processor may create a final record in the blockchain 36, based on the first machine readable indicia 32, the second machine readable indicia 34, or both to indicate the end of the supply chain. In an example, the personal device 28A may read the first machine readable indicia 32, which has a first unique code, and the second machine readable indicia 34, which as a second unique code. The personal device 28A, after extracting the first unique code and the second unique code, may generate a private key. The personal device 28A may send a request to create the final record in the blockchain 36 with the private key, wherein the private key is used to verify the authenticity of the request. After the request to create the final record in the blockchain 36 is verified, the personal device 28A is authorised to create the final record in the blockchain 36.
[0056] In an embodiment, the final record may be created based upon whether the blockchain 36 associated with the first machine readable indicia 32 does not contain an existing final record.
[0057] In another embodiment, the final record may be created based upon whether the second machine readable indicia 34 has been previously read.
[0058] In a further embodiment, the final record may be created based upon whether the first machine readable indicia 32 and second machine readable indicia 34 were sequentially read by the same personal device 28A. [0059] It would be appreciated by the person skilled in the art that access to the blockchain 36 entails that the smart device 28 and the personal device 28A are permissioned to read, write, and add content to the blockchain 36.
[0060] In an embodiment the processor of the smart device 28 or the personal device 28A is further programmed to display data associated with the blockchain. The list of information providing an indication of the multiple steps in the supply chain and a point of origin.
[0061] In another embodiment the smart device 28 or the personal device 28 A is further configured with a transceiver for facilitating communication with a server. The server facilitating functions related to authorisation of the smart device 28 or the personal device 28A. In an example, upon the personal device 28A reading the second machine readable indicia 34, the personal device 28A may transmit the access code to the server for verification. In another example, the personal device 28A may transmit code from both the first machine readable indicia 32 and the second machine readable indicia 34 to the server to determine whether the codes are identical to associated code stored on the server for verification.
[0062] In a further embodiment, the server may be configured to determine whether a user account is associated to the personal device 28A. If the user account is associated to the personal device 28A, the server issues a token to the user account. The token may be a digital representation of value.
[0063] The system 30 enables any consumer 24 to review and participate in the recordal of data to the supply chain 10. This advantageously creates a new avenue of counterfeit security and provides an avenue for the consumer to determine the authenticity of the product. The consumer 24, using the personal device 28A may be able to review the product history and to confirm both the legitimacy of the supply chain 10 and the point of origin. Additionally, the consumer 24 may subsequently create the final record of the supply chain 10, creating a record on the blockchain 36 indicating that the product has been consumed and the supply chain has ended. Once the consumer 24 has created the final record on the blockchain 36, counterfeiters are substantially denied the opportunity to use the machine readable indicia on fraudulent products. This is due to consumers being able to review the blockchain, associated with the machine readable indicia, and note that the supply chain has ended even if the product package hasn’t been compromised.
[0064] An additional advantage provided by the system 30 is the collection of valuable supply chain data and consumer data. The producers may monitor the records of the repository to determine market research information, such as average time from production to consumption, the geolocations in which the product is most popular, and even the typical time of consumption of the products.
Product package
[0065] Product packages are typically used to house products. The product package may be used to achieve various goals, such as improved presentation, the display of brand artefacts, and the preservation of the product. The design of product packages may vary in shape and dimensions. However, product packages are typically formed from two separate portions comprising a body for placement of the product, and a cover for containing the product within the space defined between the body and the cover.
[0066] Fig. 3 and Figs. 4A - 4C illustrate two embodiments of product packages that may be used in the system 30. Both product packages are provided with a first machine readable indicia 32 and a second machine readable indicia 34. The first machine readable indicia 32 being placed on a surface of the product packages such that it is readable at all steps of the supply chain. Whereas, the second machine readable indicia 34 is placed on a surface of the product package, such that it is concealed along the supply chain and is only readable at the end of the supply chain.
[0067] The first embodiment of the product package, as shown in Fig. 3, is in the form of a box-like container 40. The container 40 has a hollow body 40A with an opening 41 to allow placement of the product into the hollow body 40A. A removable cover 40B may be used to cover the opening 41.
[0068] In the example exemplified by Fig. 3, the first machine readable indicia 32 may be placed on the upper surface of the removable cover 40B. This enables the first machine readable indicia 32 to be readable at all steps of the supply chain. However, it may also be located at any other external surface of the hollow body 40A or the removable cover 40B. The second machine readable indicia 34 may be placed on an internal surface of the hollow body 40A. This enables the second machine readable indicia 34 to be concealed along the supply chain when the removable cover 40B is fitted to the hollow body 40A. The second machine readable indicia 34 is only made readable at the end of the supply chain when a consumer 24 removes the removable cover 40B in order to gain access to the product. The second machine readable indicia 34 may be placed on any internal surface of either the hollow body 40A or the cover 40B.
[0069] The second embodiment of the product package, as shown in Figs. 4 A - 4C, is in the form of a tray 42A being covered by a plastic film 42B. The tray 42A is shown to be of a rectangular shape and of a shallow depth for holding the product 44. It may be evident that the tray 42A may be of any shape and depth suitable for holding the product 44. The plastic film 42B is used to cover the top of the tray 42A such that the product 44 is substantially confined to a space defined between the tray 42A and the inner surface of the plastic film 42B. The plastic film 42B may have adhesive properties to assist in sealing any gaps between the tray 42A and the plastic film 42B and preventing the plastic film 42B from separating from the tray 42A.
[0070] In the example exemplified by Figs. 4A - 4C, the first machine readable indicia 32 may be placed on the upper surface of the plastic film 42B. This enables the first machine readable indicia 32 to be readable at all steps of the supply chain 10. It would be appreciated that the first machine readable indicia 32 may also be placed on the lower surface of the tray 42A which may not be covered by the plastic film 42B . The second machine readable indicia 34 may be placed on the upper surface of the plastic tray 42A, as shown in Fig. 4C, and concealed by the product 44, as shown in Fig. 4B. The product 44 is subsequently covered by the plastic film 42B, as shown in Fig. 4A. This enables the second machine readable indicia 34 to be concealed at all steps of the supply chain until the plastic film 42B and the product 44 are removed from the tray 42 A.
[0071] It would be appreciated by the person skilled in the art that the second machine readable indicia 34 may be obscured from view with a temporary or semi permanent cover. In an example, the temporary or semi-permanent cover may be in the form of an adhesive label or other removable cover. In another example, the temporary or semi-permanent cover may be in the form of a scratch off opaque substance.
[0072] In another embodiment, the product package may be configured with a tamper-evident device for demonstrating consumption of the product. The alteration of the tamper-evident device demonstrates a non-reversable physical operation which is indicative of product consumption. Examples of tamper-evident devices may include breakable seals, tape seals, and heat shrink wraps.
[0073] In a further embodiment, the tamper-evident device may be integral to the product package. For example, the second embodiment of the product package 42, shown by Figs. 4A - 4C involves the plastic film 42B covering both the product 44 and the tray 42A. The plastic film 42B, having adhesive properties, may be configured to be of small thickness. As such, the plastic film 42B may be substantially difficult to remove from the product 44 and the tray 42A without tearing the plastic film 42B .
[0074] The positioning of the second machine readable indicia 34 provides the advantage of ensuring that the product has reached the end of the supply chain 10 prior to the creation of the final record on the blockchain 36. This substantially reduces the likelihood of accidental creation of the final record without the product rendered consumed. The application of tamper-evident devices complement the positioning of the second machine readable indicia 34. Smart device
[0075] The smart device 28 comprises at least one processor, computer memory and a data storage. The smart device further comprises network interface hardware and software, enabling the smart device to communicate with one or more network enabled computing devices over a communications network, such as the internet or an intranet. Additionally, the smart device comprises a user interface configured to receive input and provide an output in response.
[0076] The at least one processor of the smart device 28 is configured to execute program code stored in the computer memory, causing the smart device 28 to function according to the described methods. The at least one processor may be one or more microprocessors, central processing units or other processors capable of reading and executing program code.
[0077] The computer memory may comprise one or more volatile or non-volatile memory type, such as random access memory (RAM), read-only memory (ROM) or flash memory. The computer memory is configured to store program code accessible by the at least one processor. The execution of the stored program code by the one or more processors configures the smart device 28 to perform certain functions.
[0078] The user interface is configured to receive input from the supply chain participant. The user interface is configured to provide an output. In this embodiment, the output comprises a visual output which is displayed on a smart device display. The smart device display may be a liquid crystal display (LCD), organic light emitting diode (OLED) display, or any other suitable visual display.
[0079] In an embodiment, the computer memory stores a supply chain application. The supply chain application may comprise program code and/or an authorisation code for access to the repository. Executing the program code by the at least one processor may generate the user interface and enable the supply chain participant to provide input required for creating records in the repository and processing the product at their associated step in the supply chain.
Personal Device
[0080] The personal device 28A used by the consumer 24 may be a derivative of the smart device 28. The personal device 28 A may be a multi-purpose mobile computing device, such as a smart phone. The personal device 28A further comprises an optical sensor configured for reading machine readable indicia. Additionally, the personal device 28A comprises network interface hardware and software configured to communicate over a wireless communication channel, such as a wireless internet connection.
[0081] The personal device 28A comprises a user interface for receiving input from the consumer 24. The user interface is configured to provide an output in response to the input from the consumer 24. The output may be in the form of characters being displayed upon a graphics display of the personal device 28A.
[0082] The computer memory of the personal device 28A may store the supply chain application. The embodiment of the supply chain application for the personal device 28A may comprise program code to generate a user interface for the personal device 28A and initiate the optical sensor. This enables the consumer 24 to use the personal device 28A to provide input for reading the first machine readable indicia 32, the second machine readable indicia 34, and authorising access to the repository. Subsequently, the smart device 28A may be authorised to create a final record on the repository based upon the first machine readable indicia, 32, the second machine readable indicia 34 or both at the end of the supply chain 10.
Repository
[0083] In an embodiment, the repository comprises a database housed on an external server connected over the communications network. [0084] In another embodiment, the database may also exist as a distributed ledger, in which the database exists on a plurality of distributed ledger systems connected over the communications network. One of more of the distributed ledger systems may store a complete copy of the database. Alternatively, one or more of the distributed ledger systems may store a partial copy of the database. The plurality of the distributed ledger systems share and synchronise their copies of the data with each other over the communication network. The plurality of distributed ledger systems may implement a consensus mechanism to achieve agreement on which copy is shared and synchronised.
[0085] In a further embodiment, the repository comprises a blockchain 36. The blockchain 36 is a subset of distributed ledger technology. The blockchain 36 comprises two or more blocks that are linked together, adhering to a predetermine protocol. Each block is a record akin to a container for data. The data may comprise a cryptographic hash of a previous block, a timestamp and/or ledger data. The ledger data may include one or more transaction records. These transaction records may represent the passing of the product through the multiple steps of the supply chain 10. Additionally, the blockchain 36 may comprise a primary blockchain and one or more sidechains.
[0086] In all embodiments, the repository may be configured to require authorisation to create records on the database or the blockchain 36. Authorisation may be granted by administrators of the repository. Authorisation may be in the form of login and passwords, or the matching of access codes provided by the first and second machine readable indicia 32, 34.
Method for indicating the end of a supply chain
[0087] Fig. 5 shows a flow diagram of a method for indicating the end of a supply chain 10 shown in Fig. 1. The method may be implemented by the system shown in Fig. 2. [0088] The method for indicating the end of the supply chain 10 comprises initially interfacing a blockchain comprising multiple blocks representative of multiple steps in the supply chain 10. The multiple blocks are associated with a first machine readable indicia 32 provided with the product, wherein the first machine readable indicia 32 is readable along the multiple steps of the supply chain 10.
[0089] At step 46, the method comprises reading, with the either the smart device 28 or the personal device 28A, the first machine readable indicia 32. The first machine readable indicia 32 contains code instructing the smart device 28 or the personal device 28A to proceed to step 48, wherein a list of information associated with the blockchain 36 is displayed on the personal device 28A. In particular, the list of information indicates the multiple steps in the supply chain and a point of origin. Additionally, the list of information comprises relevant data such as a time stamp, a geolocation , and a supply chain participant of each associated block of the blockchain.
[0090] This provides the advantage of the consumer and the supply chain participant to know the history of the product and to verify the authenticity of the recorded information. This enables the identification of counterfeit products and may assist in determining when and where in the supply chain 10 the counterfeit products were introduced.
[0091] In an embodiment, the first machine readable indicia 32 may contain additional code instructing the smart device 28 or the personal device 28A to establish a communication link with a server prior to proceeding to step 48. The server may host and run the supply chain software, it may provide the functions required for authorising the personal device 28A through an application programming interface, and/or may act as a proxy for the personal device 28A to access the blockchain 36.
[0092] At step 50, an authorisation request is displayed on either the smart device 28 or the personal device 28A. At the decision point 52, if the smart device 28 is being used, it will already have authorisation to access the blockchain 36 in the computer memory. This will cause the smart device 28 to proceed to step 60, wherein it can create one or more intermediate records on the blockchain 36. The one or more intermediate records being representative of data associated with that particular step of the supply chain. At the decision point 50, if the personal device 28A is being used, it will not have authorisation to access the blockchain 36. This will cause the personal device 28A to proceed to the decision point 54
[0093] At decision point 52, the personal device 28A is required to have access to the authorisation code found in the second machine readable indicia 34. The second machine readable indicia 34 is concealed along the supply chain 10 and is only readable at the end of the supply chain 10. The end of the supply chain 10 is defined as the point in which the consumer 24 has consumed the product for domestic or commercial use. This point is typically characterised by a non-reversible physical operation to the product packaging, wherein the product package is damage or otherwise marred during unpacking of the product. Additionally, tamper-evident devices, such as a band, various seals or wrapping may also require alteration/destmction in order to access the product within the product package. In this example, the second machine readable indicia 34 is concealed on an inner surface of the product package, requiring the consumer 24 to remove the cover of the product package in order to access the second machine readable indicia 34.
[0094] At step 56, the personal device 28A reads the uncovered second machine readable indicia 34. Based upon the code of the first machine readable indicia 32 and that of the second machine readable indicia 34, the personal device 28A may be authorised to access the blockchain 36. In an embodiment, authorising the personal device 28A comprises determine that the second machine readable indicia 34 contains an authorisation code associated with the first machine readable indicia 32. In another embodiment, authorising the personal device 28A comprises determine that the first machine readable indicia 32 and the second machine readable indicia 34 have identical code to verification code found on a server.
[0095] At step 58, the personal device 2A creates a final record in the blockchain based on the first machine readable indicia 32, the second machine readable indicia 34 or both to indicate the end of the supply chain 10. In an embodiment, the final record may include additional information in the form of a datum confirming consumption of the product. In another embodiment, the final record may include additional information in the form of consumption data in the form of a timestamp and/or a geolocation based upon the personal device 28A.
[0096] After the creation of the final record, the personal device 28A may be in communication with a server that contains data relating to prospective user account associated to consumers of the product. The server, upon communicating with the personal device 28A through the supply chain application stored on the computer memory of the personal device 28A, may derive that there is a user account associated to the personal device 28A. The user account may be similar to a loyalty program offered by many retailers or service providers. Upon determining the associated user account, a token may be issued to the user account upon recordal of the consumption of the product on the blockchain 36. The token, which may be in the form of a loyalty point or otherwise, may have a digital representation of value associated to the user account. This digital representation of value may be a crypto currency, discount on future purchase, or even a cash rebate.
[0097] The issuance of a token after confirmation of the consumption of the product on the blockchain 36 indirectly acts as a verification of the authenticity of the product. If a token was not provided to the user account, the consumer would comprehend that the product was a counterfeit.
[0098] It would be appreciated by the person skilled in the art that the user account may be associated with various types of products that use the method for indicating the end of the supply chain. The user account may be configured to accumulate the tokens issued from the creation of the final records from the various products.
[0099] It should also be understood that, unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as "estimating" or "processing" or "computing" or "calculating", "optimizing" or "determining" or "displaying" or “maximising” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that processes and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
[0100] It will be appreciated by persons skilled in the art that numerous variations and/or modifications may be made to the above-described embodiments, without departing from the broad general scope of the present disclosure. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive.

Claims

1. A method for indicating the end of a supply chain, the method comprising: interfacing a blockchain comprising multiple blocks representative of multiple steps in the supply chain, the multiple blocks being associated with a first machine readable indicia provided with the product, the first machine readable indicia being readable along the supply chain; reading, with a personal device, the first machine readable indicia; reading, with the personal device, a second machine readable indicia provided with the product, the second machine readable indicia being concealed along the supply chain and readable at the end of the supply chain; based on the first machine readable indicia and the second machine readable indicia, authorising the personal device to access the blockchain; creating a final record in the blockchain based on the first machine readable indicia or the second machine readable indicia or both to indicate the end of the supply chain.
2. A method of claim 1, wherein authorising the personal device comprises determining that the second machine readable indicia contains an authorisation code associated with the first machine readable indicia.
3. A method of claim 1, wherein authorising the personal device comprises determining that the first machine readable indicia and the second machine readable indicia have identical code to verification code stored on a server.
4. A method of any of the preceding claims, wherein the final record contains a datum confirming consumption of the product.
5. A method of any of the preceding claims, wherein the final record contains a datum comprising a timestamp of the personal device.
6. A method of any of the preceding claims, wherein the final record contains a datum comprising a geolocation of the personal device.
7. A method of any of the preceding claims, further comprising, after reading the first machine readable indicia: displaying, on the personal device, a list of information associated with the blockchain; wherein the list of information indicates the multiple steps in the supply chain and a point of origin.
8. A method of claim 7, wherein the list of information comprises a time stamp, a geolocation, and a supply chain participant of each associated block of the blockchain.
9. A method of any of the preceding claims, wherein the second machine readable indicia is concealed on an inner surface of a product package containing the product.
10. A method of claim 9, wherein the second machine readable indicia is made readable by removing a cover of the package.
11. A method of either claim 9 or 10, wherein the second machine readable indicia is made readable by removing the product from the product package.
12. A method of any of the preceding claims, where the end of the supply chain is characterised by a non-reversible physical operation to the product packaging.
13. A method to claim 12, wherein the non-reversible physical operation is the alteration of a tamper-evident device.
14. A method of claim 13, wherein the tamper-evident device is a band, a label or a seal.
15. A method of any of the previous claims, wherein the product is an agricultural product.
16. A method of any of claims 1 to 14, wherein the product is a processed agricultural product.
17. A method of any of the previous claims, wherein the method further comprises: determining, by the server, a user account associated to the personal device; and issuing a token to the user account.
18. A method according to claim 17, wherein the token includes a digital representation of value that is associated to the user account.
19. A system for indicating the end of a supply chain, the system comprising: a product provided with a first machine readable indicia and a second machine readable indicia; wherein the first machine readable indicia is associated with a blockchain comprising multiple blocks representative of multiple steps in the supply chain, the first machine readable indicia is readable at all steps of the supply chain; and wherein the second machine readable indicia concealed along the supply chain and readable at the end of the supply chain; and a personal device configured with an optical sensor and a processor; wherein the processor is programmed to: read the first machine readable indicia; read the second machine readable indicia; receive authorisation from the server to access the blockchain based upon the first machine readable indicia and the second machine readable indicia; and create a final record in the blockchain based on the first machine readable indicia or the second machine readable indicia or both to indicate the end of the supply chain.
20. A system of claim 19, wherein the processor is further programmed to display a list of information associated with the blockchain; wherein the list of information indicates the multiple steps in the supply chain and a point of origin.
21. A system of either claim 19 or 20, wherein the product is an agricultural product.
22. A system of claim 21, wherein the product is a processed agricultural product.
23. A system of any of claims 19 to 22, wherein the product is housed within a product package.
24. A system of claim 23, wherein the product package is configured with a tamper-evident device.
25. A system of any of claims 19 to 24, wherein the personal device is further configured with a transceiver, and the processor is further programmed to communicate with a server, wherein the server determines whether a user account is associated with the personal device and causes a token to be issued to the user account.
PCT/AU2021/050183 2020-03-04 2021-03-03 A method and system for indicating the end of a supply chain WO2021174302A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2020900659A AU2020900659A0 (en) 2020-03-04 A Method and System for Indicating the End of a Supply Chain
AU2020900659 2020-03-04

Publications (1)

Publication Number Publication Date
WO2021174302A1 true WO2021174302A1 (en) 2021-09-10

Family

ID=77612546

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2021/050183 WO2021174302A1 (en) 2020-03-04 2021-03-03 A method and system for indicating the end of a supply chain

Country Status (1)

Country Link
WO (1) WO2021174302A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160314475A1 (en) * 2013-12-17 2016-10-27 Omniblend Innovation Pty Ltd Method and system for verifying of the authenticity of a consumer product
US20170228742A1 (en) * 2015-12-21 2017-08-10 Mohamed Alaa Aljawhari Method and apparatus for managing and providing provenance of product
US20180094953A1 (en) * 2016-10-01 2018-04-05 Shay C. Colson Distributed Manufacturing
WO2019030653A1 (en) * 2017-08-08 2019-02-14 3M Innovative Properties Company Article attestation system using blockchain
US20190342085A1 (en) * 2018-05-02 2019-11-07 Green Light Solutions Corp. System and method for tracking product and providing verified product information and consumer rewards
US20190354829A1 (en) * 2017-07-20 2019-11-21 Laava Id Pty Ltd Systems and methods for generating secure tags

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160314475A1 (en) * 2013-12-17 2016-10-27 Omniblend Innovation Pty Ltd Method and system for verifying of the authenticity of a consumer product
US20170228742A1 (en) * 2015-12-21 2017-08-10 Mohamed Alaa Aljawhari Method and apparatus for managing and providing provenance of product
US20180094953A1 (en) * 2016-10-01 2018-04-05 Shay C. Colson Distributed Manufacturing
US20190354829A1 (en) * 2017-07-20 2019-11-21 Laava Id Pty Ltd Systems and methods for generating secure tags
WO2019030653A1 (en) * 2017-08-08 2019-02-14 3M Innovative Properties Company Article attestation system using blockchain
US20190342085A1 (en) * 2018-05-02 2019-11-07 Green Light Solutions Corp. System and method for tracking product and providing verified product information and consumer rewards

Similar Documents

Publication Publication Date Title
US20180349893A1 (en) System for outputting product traceability code
US20180108024A1 (en) Open registry for provenance and tracking of goods in the supply chain
JP6189454B2 (en) Unlicensed product detection techniques
AU2017100056A4 (en) Method and system for verifying of the authenticity of a consumer product
US6226619B1 (en) Method and system for preventing counterfeiting of high price wholesale and retail items
US20180032759A1 (en) Open registry for human identification
US20140014714A1 (en) Product authentication and registration
JP2004252621A (en) Product authentication system preventing market distribution of fake
US20150223580A1 (en) Secure diamond smart cards and exchange systems therefor
JP2007122469A (en) Method and system using bar code pair for commodity true/false determination
CN101416246A (en) Method and systems using identifier tags and authenticity certificates for detecting counterfeited or stolen brand objects
WO2018075403A1 (en) Open registry for provenance and tracking of goods in the supply chain
WO2018067974A1 (en) Open registry for human identification
CN107977845A (en) Food traceability system and method based on label information
Shaik Preventing counterfeit products using cryptography, qr code and webservice
Kumar Pharmaceutical drug packaging and traceability: A comprehensive review
CN113129029A (en) Wine anti-counterfeiting traceability system based on block chain and RFID
KR20040085800A (en) contactless type communication tag and portable tag reader for verifying a genuine article
KR20090058473A (en) The method of authentication of the items put into circulation
WO2014014401A2 (en) Authentication of a product
Yiu An NFC-enabled anti-counterfeiting system for wine industry
KR100524176B1 (en) Mobile phone capable of reading genuine article verifying information stored in a RF-tag and method for administrating service management executable in a computer communicating with the same phone
WO2018064329A1 (en) Open registry for internet of things including sealed materials
CN105069634A (en) Packaging box, anti-counterfeiting method, anti-counterfeiting device, anti-counterfeiting authentication method and device
JP2017503286A (en) Authentication method and system for package product from remote location

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21763641

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21763641

Country of ref document: EP

Kind code of ref document: A1