Rastogi et al., 2022 - Google Patents
NFC-enabled packaging to detect tampering and prevent counterfeiting: enabling a complete supply chain using blockchain and CPSRastogi et al., 2022
View PDF- Document ID
- 2062033794545274717
- Author
- Rastogi R
- Sharma B
- Gupta N
- Gaur V
- Gupta M
- Kohli V
- Sharma A
- Srivastava P
- Rai A
- et al.
- Publication year
- Publication venue
- Blockchain Applications for Healthcare Informatics
External Links
Snippet
Medicines play a vital role in human lives and that's why the market size of medicines is quite large. Amid the pandemic of COVID-19 in the 21st century, the governments of many countries as well as healthcare industries, hospitals, doctors, and patients are facing a …
- 238000004806 packaging method and process 0 title description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/08—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
- G06K19/10—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/34—Computer-assisted medical diagnosis or treatment, e.g. computerised prescription or delivery of medication or diets, computerised local control of medical devices, medical expert systems or telemedicine
- G06F19/3456—Computer-assisted prescription or delivery of medication, e.g. prescription filling or compliance checking
- G06F19/3462—Computer-assisted distribution of medication from dispensers, i.e. making sure that medication is correctly delivered to patients
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hassija et al. | A survey on supply chain security: Application areas, security threats, and solution architectures | |
| US10878429B2 (en) | Systems and methods for using codes and images within a blockchain | |
| US20200364817A1 (en) | Machine type communication system or device for recording supply chain information on a distributed ledger in a peer to peer network | |
| US12111902B2 (en) | Systems and methods for a connected computing resource and event/activity identification information infrastructure using near existential or existential biometric identification of humans | |
| Lee et al. | Blockchain-based traceability for anti-counterfeit in cross-border e-commerce transactions | |
| Akhtar et al. | Traceability and detection of counterfeit medicines in pharmaceutical supply chain using blockchain-based architectures | |
| Saeed et al. | A systematic review of digital technology and innovation and its potential to address anti-corruption, transparency, and accountability in the pharmaceutical supply chain | |
| KR20220050870A (en) | System for Detecting Counterfeit product based on block chain and Driving Method thereof | |
| Kwok et al. | Design and development of a mobile EPC-RFID-based self-validation system (MESS) for product authentication | |
| Khalil et al. | A new secure RFID anti-counterfeiting and anti-theft scheme for merchandise | |
| Scott et al. | Evaluating feasibility of blockchain application for DSCSA compliance | |
| Yiu | An nfc-enabled anti-counterfeiting system for wine industry | |
| Al Noman et al. | An intelligent application for preventing the counterfeit medicines through a distributed blockchain | |
| Rastogi et al. | NFC-enabled packaging to detect tampering and prevent counterfeiting: enabling a complete supply chain using blockchain and CPS | |
| Uhlmann | Reducing counterfeit products with blockchains | |
| Rastogia et al. | Muskan Guptac, Vrinda Kohlic, Ankur Sharmac, Komalc, Prajwal Srivastavac, and Aarushi Raic aDepartment of CSE, ABES Engineering College, Ghaziabad, Uttar Pradesh, India, bDepartment of CSE and MBA, ABES Engineering College, Ghaziabad, Uttar Pradesh, India, cABES | |
| Hossain et al. | A cost-effective counterfeiting prevention method using hashing, QR code, and website | |
| Tanwar | Blockchain Applications for Healthcare Informatics: Beyond 5G | |
| Lahjouji et al. | Blockchain Applications for Improving Track and Trace Process on Pharmaceutical Supply Chain | |
| Muammar et al. | A framework introducing implications of RFID network threats to businesses | |
| Sudha et al. | Asset Tracking System using Blockchain | |
| Nandal | A Blockchain Based System for Product Tracing and Tracking in the Supply Chain Management | |
| Anu et al. | Blockchain-powered authentication and supply chain integration to combat counterfeit drugs | |
| Sharma et al. | Secure rural supply chain management using low cost paper watermarking | |
| Thakur | Blockchain Technology to Combat Counterfeiting of Drugs in the Pharmaceutical Industry |