Authors :
Sanket Mungase; Vinayak Shinde; Tejas Wakchaure; Bhavana Chaudhari
Volume/Issue :
Volume 9 - 2024, Issue 4 - April
Google Scholar :
https://tinyurl.com/5n65djjk
Scribd :
https://tinyurl.com/3ca9dkbd
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24APR680
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
A fraudulent practice where products that are
passed off as genuine, product counterfeiting represents
consumer fraud, which translates to financial losses.
Transparency in supply chain management also faces a
big challenge in terms of service repetition and lack of
coordination. Numerous remedies have been
implemented to battle counterfeiting, among them
Artificial Intelligence and RFID, among others, all of
which have significant issues such as incivility. This
project tackles the problem by applying blockchain
technology to improve counterfeit determination and
assure product items’ authenticity all over the source
chain. The scheme is built on blockchain encryption
techniques, which promote a decentralized service for
genuine authentication and duplication identification.
Through the usage of QR codes and barcodes found in
wireless technologies, counterfeit items are eradicated .
When scanning a product’s QR or barcode with a camera
scanner, the product’s unique code is linked to the
blockchain, and all its complete details are stored within
it. The database consists of multiple blocks, each one
representing a unique product. In case of scanning, if the
entered code matches with the database, a popup
notification will display on the customer’s device that this
product is genuine. Contrary to it, if there is no match
found, means it is a counterfeit product; then a popup
displays on the customer’s mobile, computer screen about
the fraud transaction of the manufacturer from which
points this scam is originating if the customer allows
doing this action using the application . This will enable
users to authenticate products independently without
relying on sellers.
Keywords :
Counterfeiting, Blockchain Technology, Supply Chain Management, QR Codes, Product Authenticity, Fraud Detection, RFID Tags, Decentralization, Data Security.
A fraudulent practice where products that are
passed off as genuine, product counterfeiting represents
consumer fraud, which translates to financial losses.
Transparency in supply chain management also faces a
big challenge in terms of service repetition and lack of
coordination. Numerous remedies have been
implemented to battle counterfeiting, among them
Artificial Intelligence and RFID, among others, all of
which have significant issues such as incivility. This
project tackles the problem by applying blockchain
technology to improve counterfeit determination and
assure product items’ authenticity all over the source
chain. The scheme is built on blockchain encryption
techniques, which promote a decentralized service for
genuine authentication and duplication identification.
Through the usage of QR codes and barcodes found in
wireless technologies, counterfeit items are eradicated .
When scanning a product’s QR or barcode with a camera
scanner, the product’s unique code is linked to the
blockchain, and all its complete details are stored within
it. The database consists of multiple blocks, each one
representing a unique product. In case of scanning, if the
entered code matches with the database, a popup
notification will display on the customer’s device that this
product is genuine. Contrary to it, if there is no match
found, means it is a counterfeit product; then a popup
displays on the customer’s mobile, computer screen about
the fraud transaction of the manufacturer from which
points this scam is originating if the customer allows
doing this action using the application . This will enable
users to authenticate products independently without
relying on sellers.
Keywords :
Counterfeiting, Blockchain Technology, Supply Chain Management, QR Codes, Product Authenticity, Fraud Detection, RFID Tags, Decentralization, Data Security.