Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Identifying Fake Products Through A Barcode-Based Blockchain System

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 8

Identifying Fake Products Through A Barcode-

Based Blockchain System

1) Background/ Problem Statement

With the rise of globalization and the ever-increasing rate of


technological advancement, the volume of production as well as the
ease of obtaining counterfeit goods has reached new levels. It impacts
a company's sales, reputation, and revenues, as well as poses a lethal
hazard to unsuspecting customers.

Our Fake Product Identification Through Barcode Using Blockchain


Technology System – a Dotnet project proposes a form of identification
of fake products using blockchain technology. In the proposed system,
we are assigning a barcode to a particular product created by the
manufacturer along with all the details of the product and the end
customer can scan that barcode to get all information about that
product. After scanning the barcode, the user can identify whether the
product is real or fake.
2) Working of the Project

Our project proposes a convenient, accurate and low-cost product anti-


counterfeiting solution. It comprises 2 modules, including Admin and
User. The admin will have the access to add, update, view and delete
the products. They also have to add the product information, including
Product Serial Id, Date of Manufacture, Origin of the Product, Expiry
Date, etc., along with the information of the seller. The admin can also
view fake entries.

The user would need to register first to log into the system. To check
out whether a product is fake or not, the user would need to scan the
barcode of the product. If it detects the product, the user will be able to
see all the details of the product. If the scanned barcode is fake, it will
let the user know that the product is fake. If no product is found, the
user can upload a product photo with details as a fake product entry to
admin.

All the details here are saved in a block to ensure that no product
information is fabricated or modified. In this project, the front end
involves Html, CSS, and JavaScript and the back end involves MSSQL.
The IDE used is Visual Studio.
3) Advantages

It is easy to maintain.
The system is user-friendly.
It provides security to consumers by offering authentic data to
them.
It aims to stop the making of fake products by conducting
transparency about the products to the notice of the consumers.
4) System Description

The system comprises 2 major modules with their sub-modules as


follows:

 Admin:

• Log in:

- The admin can log in using a username and password.

• Manage Products:

- The admin can add, update, delete and view the products.

- They can add all the information related to a product, including

Product Serial Id
Date of Manufacture
Origin of the Product
Expiry Date
And more

- They can add information about the seller selling the product.

• Fake Entries:

- The admin can view fake entries.


 User:

• Register:

- The user would need to register first to log into the system.

• Login:

- The user can log in using a username and password.

• Change Password:

- The user can change the password as per their choice.

• Scan Product:

- The user would need to scan the Barcode of the product.

- If the product is found, the user will be able to see all the details of
the same product.

- If the scanned barcode is fake, it will inform the user that the product
is fake.

- If no product is found, the user can upload the product photo with
details as a fake product entry to the admin.
5) Project Life Cycle

The waterfall model is a classical model used in the system


development life cycle to create a system with a linear and sequential
approach. It is termed a waterfall because the model develops
systematically from one phase to another in a downward fashion. The
waterfall approach does not define the process to go back to the
previous phase to handle changes in requirements. The waterfall
approach is the earliest approach that was used for software
development.
6) System Requirements

I. Hardware Requirement

i. Laptop or PC
 Windows 7 or higher
 I3 processor system or higher
 4 GB RAM or higher
 100 GB ROM or higher

II. Software Requirement

ii. Laptop or PC
 Visual Studio 2019
 SQL Server Management Studio latest
7) Limitation/Disadvantages

It sometimes results in inaccurate results.

8) Application –

The system is designed to protect brand value and


duplication threats by developing a fake product detection
system using blockchain technology.

9) Reference
 https://www.researchgate.net/publication/
353971876_Counterfeited_Product_Identification_in_a_Supply_Chain_usin
g_Blockchain_Technology
 https://www.projectwale.com/2022/07/11/fake-product-identification-
using-blockchain-technology/
 https://ijariie.com/AdminUploadPdf/
Fake_Product_Detection_Using_Blockchain_Technology_ijariie14881.pdf
 https://www.infosys.com/industries/high-technology/white-papers/
documents/deter-counterfeiting.pdf

You might also like