Secure product identification and verification
First Claim
1. A method, comprising:
- receiving, by one or more devices, first information regarding an item at a first location to be shipped to a destination;
performing, by the one or more devices, a first item analysis on the item to determine a first identifier of the item,an item analysis including at least one of;
a spectral analysis,a chemical analysis, ora molecular analysis;
determining, by the one or more devices and from the first identifier, an attribute of the item;
creating, by the one or more devices, an encrypted record in a blockchain for the item,the encrypted record including;
the first information regarding the item,information identifying the attribute, andinformation identifying a term of a contract,the blockchain to be accessible during transportation of the item to the destination, andthe blockchain to be analyzed, at a plurality of stages during transportation of the item to the destination, to verify the blockchain;
receiving, by the one or more devices, second information regarding the item at a second location;
performing, by the one or more devices based on receiving the second information, a second item analysis on the item to determine a second identifier of the item;
obtaining, by the one or more devices, the encrypted record from the blockchain;
verifying, by the one or more devices, whether the second identifier matches the first identifier using the encrypted record;
determining, by the one or more devices and based on the second identifier not matching the first identifier, that tampering of the item occurred during a time period,the time period including one or more of;
a first time when the item is at the first location,a second time when the item is at the second location, ora third time that is after the first time and before the second time; and
performing, by the one or more devices, an action based on determining that tampering of the item occurred.
1 Assignment
0 Petitions
Accused Products
Abstract
A device may receive an indication that a product has arrived at a destination. The product may have been shipped by an entity to the destination. The device may perform an analysis on the product to determine an attribute of the product. The device may perform a comparison of information identifying the attribute of the product and information included in an encrypted record, for the product, of a blockchain, to verify the attribute of the product. The information included in the encrypted record may be related to attributes of the product. The attributes of the product may have been determined by the entity that shipped the product to the destination. The device may determine whether the attribute of the product is verified based on performing the comparison. The device may perform an action based on determining whether the attribute of the product is verified.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving, by one or more devices, first information regarding an item at a first location to be shipped to a destination; performing, by the one or more devices, a first item analysis on the item to determine a first identifier of the item, an item analysis including at least one of; a spectral analysis, a chemical analysis, or a molecular analysis; determining, by the one or more devices and from the first identifier, an attribute of the item; creating, by the one or more devices, an encrypted record in a blockchain for the item, the encrypted record including; the first information regarding the item, information identifying the attribute, and information identifying a term of a contract, the blockchain to be accessible during transportation of the item to the destination, and the blockchain to be analyzed, at a plurality of stages during transportation of the item to the destination, to verify the blockchain; receiving, by the one or more devices, second information regarding the item at a second location; performing, by the one or more devices based on receiving the second information, a second item analysis on the item to determine a second identifier of the item; obtaining, by the one or more devices, the encrypted record from the blockchain; verifying, by the one or more devices, whether the second identifier matches the first identifier using the encrypted record; determining, by the one or more devices and based on the second identifier not matching the first identifier, that tampering of the item occurred during a time period, the time period including one or more of; a first time when the item is at the first location, a second time when the item is at the second location, or a third time that is after the first time and before the second time; and performing, by the one or more devices, an action based on determining that tampering of the item occurred. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium storing instructions, the instructions comprising:
one or more instructions that, when executed by one or more processors, cause the one or more processors to; receive first information regarding an item at a first location to be shipped to a destination; perform a first item analysis on the item to determine a first identifier of the item, an item analysis including at least one of; a spectral analysis, a chemical analysis, or a molecular analysis; determine, from the first identifier, an attribute of the item; create an encrypted record in a blockchain for the item, the encrypted record including; the first information regarding the item, information identifying the attribute, and information identifying a term of a contract, the blockchain to be accessible during transportation of the item to the destination, and the blockchain to be analyzed, at a plurality of stages during transportation of the item to the destination, to verify the blockchain; receive second information regarding the item at a second location; perform, based on receiving the second information, a second item analysis on the item to determine a second identifier of the item; obtain the encrypted record from the blockchain; verify whether the second identifier matches the first identifier using the encrypted record; determine, based on the second identifier not matching the first identifier, that tampering of the item occurred during a time period, the time period including one or more of; a first time when the item is at the first location, a second time when the item is at the second location, or a third time that is after the first time and before the second time; and perform an action based on determining that tampering of the item occurred. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A device, comprising:
one or more processors to; receive first information regarding an item at a first location to be shipped to a destination; perform a first item analysis on the item to determine a first identifier of the item, an item analysis including at least one of; a spectral analysis, a chemical analysis, or a molecular analysis; determine, from the first identifier, an attribute of the item; create an encrypted record in a blockchain for the item, the encrypted record including; the first information regarding the item, information identifying the attribute, and information identifying a term of a contract, the blockchain to be accessible during transportation of the item to the destination, and the blockchain to be analyzed, at a plurality of stages during transportation of the item to the destination, to verify the blockchain; receive second information regarding the item at a second location; perform, based on receiving the second information, a second item analysis on the item to determine a second identifier of the item; obtain the encrypted record from the blockchain; verify whether the second identifier matches the first identifier using the encrypted record; determine, based on the second identifier not matching the first identifier, that tampering of the item occurred during a time period, the time period including one or more of; a first time when the item is at the first location, a second time when the item is at the second location, or a third time that is after the first time and before the second time; and perform an action based on determining that tampering of the item occurred. - View Dependent Claims (16, 17, 18, 19, 20)
Specification