Nehete et al., 2024 - Google Patents
Cosmetic Product Provenance Identification Technique Utilizing Blockchain TechnologyNehete et al., 2024
View PDF- Document ID
- 7158608691424953326
- Author
- Nehete P
- Gaikwad R
- Patil R
- Publication year
External Links
Snippet
The proliferation of counterfeit goods poses a grave threat to both industrial sectors and consumers, with increasing incidents negatively impacting sales, profits, and brand credibility. Counterfeiting not only hampers a company's revenue streams but also erodes …
- 238000005516 engineering process 0 title abstract description 36
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
- G07D7/0006—Security markings visible to the naked eye
- G07D7/0033—Checkcodes, e.g. coded number derived from serial number and value
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
- G07D7/20—Testing patterns thereon, e.g. recognition of patterns, image processing, comparing to a reference in a memory
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
- G07D7/0046—Security markings invisible to the naked eye, e.g. "digital watermarks"
- G07D7/0066—Security markings invisible to the naked eye, e.g. "digital watermarks" involving markings the properties of which are altered from original properties
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nizamuddin et al. | Blockchain-based framework for protecting author royalty of digital assets | |
Badzar | Blockchain for securing sustainable transport contracts and supply chain transparency-An explorative study of blockchain technology in logistics | |
Vashistha et al. | eChain: A blockchain-enabled ecosystem for electronic device authenticity verification | |
US20160098723A1 (en) | System and method for block-chain verification of goods | |
Badzar | Blockchain for securing sustainable transport contracts and supply chain transparency | |
Boehm et al. | Holistic tracking of products on the blockchain using NFC and verified users | |
Wasnik et al. | Detection of counterfeit products using blockchain | |
Murdoch et al. | Security protocols and evidence: Where many payment systems fail | |
Anita et al. | Blockchain-based anonymous anti-counterfeit supply chain framework | |
Falcone et al. | PUF-based smart tags for supply chain management | |
Bhushan et al. | Security magnification in supply chain management using blockchain technology | |
Oladejo | Blockchain technology: Disruptor or enhancer to the accounting and auditing profession | |
Allison et al. | Applying blockchain to product compliance and assurance in the construction industry | |
Makanyadevi et al. | QR Code with Block Chain Technology for Medical Device Ownership | |
Bui et al. | Assessing the authenticity of subjective information in the blockchain: a survey and open issues | |
Jadon et al. | Blockchain in the electronics industry for supply chain management: A survey | |
Wasaf et al. | A dual‐case analysis of the IP governance system in e‐commerce: Amazon and Alibaba | |
Nehete et al. | Cosmetic Product Provenance Identification Technique Utilizing Blockchain Technology | |
Sharma et al. | A multilevel authentication-based blockchain powered medicine anti-counterfeiting for reliable IoT supply chain management | |
Lee et al. | Non-Fungible Token Fraud: Studying security issues and improvements for NFTmarketplaces using hashing techniques | |
Rajalakshmi et al. | Fake Product Identification System | |
Mnasri et al. | 5 Current Advances on the Application of Blockchain Solutions in Digital Marketing | |
Nagar et al. | Product Authentication System using Blockchain | |
Sulaiman et al. | Blockchain Technology to Detect Fake Products | |
Mezenev | Improving the efficiency and reliability of the supply chain using blockchain technology |