BRAND PROTECTION MANAGEMENT SYSTEM
First Claim
Patent Images
1. A method of detecting unauthorised events occurring in a product supply chain, the method comprising:
- receiving data associated with an item at a plurality of points in a supply chain;
generating a respective event record for the data received, andcomparing said generated event records with at least one modelled supply chain that has one or more expected states to detect generated event records that not match the expected states of the supply chain model.
1 Assignment
0 Petitions
Accused Products
Abstract
A product management system for monitoring the movement of products through a supply chain, the system being adapted to receive data from reader devices that capture data associated with the products as they move through the chain. The captured data is used to generate an event record for each product, at each stage in the supply chain. These records are used, together with at least one model of the supply chain, to detect anomalous events.
-
Citations
29 Claims
-
1. A method of detecting unauthorised events occurring in a product supply chain, the method comprising:
-
receiving data associated with an item at a plurality of points in a supply chain; generating a respective event record for the data received, and comparing said generated event records with at least one modelled supply chain that has one or more expected states to detect generated event records that not match the expected states of the supply chain model. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A product management system for use with data capture means for capturing data associated with items in a supply chain, the product management system comprising:
-
means for generating event records from data captured by the data capture means, each event record corresponding to data captured from an item at a point in a supply chain; and processor means for processing each generated event record to compare said generated event records with at least one supply chain model, so as to detect any generated event records that do not match with said model supply chain. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 28)
-
-
20. A method of detecting unauthorised events in a product supply chain, the method comprising:
-
monitoring movement of products through a supply chain or a part thereof using data captured from the products; generating a respective event record for the data captured for each pass of the supply chain, and using the event records generated to detect or predict one or more anomalous events. - View Dependent Claims (21, 22, 23)
-
-
24. A system for detecting unauthorised events occurring in a product supply chain, the system being configured to:
-
monitor movement of products through a supply chain using data captured from the products at a plurality of points in the chain over a period such that multiple passes are made by multiple products; generate a respective event record for the data captured for each pass of the supply chain and use the event records generated to detect or predict one or more anomalous patterns or future events. - View Dependent Claims (25, 26, 27)
-
-
29. (canceled)
Specification