Product Anti-Counterfeiting Using Blockchain
Product Anti-Counterfeiting Using Blockchain
https://doi.org/10.22214/ijraset.2022.44077
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
Abstract: Fake Products is a serious issue, as in today’s world we can’t really distinguish between real and fake product. And
some people make these fake products just to make some profit without thinking about its impact on user and also affects
company’s name, profit and sales.
Blockchain technology can be used to detect whether the product is real or fake and assure user about the authenticity of the
product. Blockchain technology is the technology where information is stored in the form of blocks in many databases which is
connected with the chains and it doesn’t require any third-party users for permission. We can use QR code or an encrypted
unique codewhich is a very efficient technique to detect fake product.
When the QR code is scanned or theunique code is entered, it will redirect us to the blockchain containing the information of the
product and provides us the details of the manufacturer and information of owner to make decision easy for buyer if they are
looking to buy the product.
Keywords: Counterfeit product, QR code, Blockchain.
I. INTRODUCTION
Fake products create a huge negative impact in the market for both buyers and sellers. The sellers fail to deliver the product as per
the consumers expectations and the consumers starts to doubt the quality and standards of the company which ultimately results in
the negative marketing of the brand whose fake products are being circulated in the market. The most critical part about counterfeit
products is that it can be really harmful for the consumers. Since, the fake or counterfeit products are not restricted to any particular
sector in the market therefore it has become really important for us to detect these products and find a way to keep them out of the
market. These products can be really dangerous if we consider very dominating sectors of market like pharmaceutical and food
supplies. To tackle such problems, we need to maintain a data which is easily accessible to consumers where they can verify the
details about the products and build a level of trust regarding the product authenticity. As we all know that no product is safe from
counterfeiting due to the continuous growth in counterfeit products in the supply chain. It is degrading company’s name and their
profit, it also affects the customer. In this project, we will be using blockchain technology to find genuineness of the product.
Blockchain technology is generally a ledger system which holds all the data of the transactions that take place on it. In this project,
we propose a system where we store product’s detail and its ownership status on architecture and we use smart contract to update the
owner of the product when the product is sold. We willbe using QR code which will be scanned by customer such that he/she will be
able to find out the details of the product like manufacturing details, current owner etc. And will be able to determine whether the
product is fake or real.
A. Motivation
There In recent years, the spread of counterfeit goods has become global. There are many fake products in the current supply chain.
According to the report, fake product incidents have risen in the last few years. It is necessary to have a system for customers or
users to check the all details of the product so that users can decide that the product is real or fake. In India currently, there is no
such system to detect counterfeit products. So, the solution involves a simple QR code-based identification that can help the end-
user or customers to scan and identify the genuineness of the product by using a smartphone.
B. Objective
The idea of this project came into existence because of the increase in the counterfeit products. The objectives of this project are:
1) To Design Anti Counterfeit System using Blockchain.
2) To secure product details using a QR code.
3) Provide security to the clients by offering data to client.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1844
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
A. Blockchain Technology
Blockchain data is stored on each node, then the nodes exchange information with each other over the network. Each node maintains
an entire Blockchain data. The node will verify the received transactions and include them in the new block based on its own
Blockchain data, and try to obtain theaccounting rights of the new block in the above manner.
B. Blockchain Features
In today’s social system a large part of the economic behavior of individuals depends on trust where regularly two sides interact
with a third party, thus forming a trust relationship. Usually, there is a mutual non-trust between these two parties that have long been
based on trust guarantees provided by third parties, therefore it is important to take notice of the characteristics of Blockchain
technology that help subvert the foundation of human transactions that have been conducted for thousands of years.
Using Blockchain one can create a data record system that does not depend on a trusted third party as a transaction intermediary, and
that is openly shared and reliable at the same time. The characteristics of Blockchain technology are described in detail below. (Fig.
2)
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1845
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
1) Security and Privacy: Public key encryption in cryptography is used in Blockchain to protect data security. Users can generate
their own key pairs, including a private key and a public key. Private key is used to sign data, and public key is used to verify the
authenticity of the signed data. As long as the user prevents the private key from leaking, the data will remain secure. In
Blockchain, each user is anonymous, and each user can have multiple addresses. When the system is operating, only one address
is used as the identification, and the anonymous address can hardly be mapped to the real person, thereby protecting the user’s
privacy.
2) Decentralization: Through decentralized operations and storage, each node of the Blockchain implements the verification,
delivery, and management of information at the local side. Blockchain technology does not rely on an additional third-party
control, has no centralized control, and is self-contained.
3) Untraceability: After a block has been determined in the Blockchain, it cannot be tampered with. Due to the following
circumstances, once a block in the Blockchain is altered, it will be immediately detected and rejected by other nodes.
4) Transparency: The data in Blockchain is completely public and anyone can inquire. Within the Information flow one can clearly
see who is passing data to whom as Blockchain maintains a continuous transaction log file.
5) Flexibility: The technology of Blockchain is open source and anyone can use it to modify it into their own version. There are
already numerous flexible Blockchain platforms available, and users can also redevelop a new Blockchain platform if they
desireso. Blockchain is an unlimited technology meaning that users can create multiple applications based on Blockchain.
V. SYSTEM ARCHITECHTURE
BLOCK
UPLOAD QR CODE CHAIN
PRODUCT
ADMIN ALGORITHM SERVER
PRODUCT
VERIFICATION PURCHASE
EMAIL PRODUCT
USER
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1846
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
We have designed our website with single login for both the admin and the customers. Admin will be uploading the products to the
website and these details like product name, product ID, product type will be stored in the database. Based on product ID, QR code
will be generated. For Encryption, Block chain algorithm is used. The encrypted QR code will be stored in the server. The user will
fetch the product from the server. After the product selection, admin will send the verification email to the user.
VI. MODULES
In general, there are four modules used in our proposed system namely,
A. Login/Logout
In this module, the user will be creating their login username and password by submitting their information like name, mail id,
phone number etc and these details will be stored in the server. Once they have registered, the user can login into the website by
using their username and password which was already registered in the server. It compares whether the given username and
password matches with the stored username and password in the server. If the username and password is matched then the user can
login to the website else if it doesn't match then the access is denied.
D. Email Verification
Once we click the purchase button, an alert message will be popping up and it displays whether the product is original or fake .After
clicking ok button in the popup an email will also be sent for our verification purpose. To send the email from server to user, STMP
email package has been used. In particular, for sending mail send email method has been used.
VII. CONCLUSION
Counterfeit products are developing dramatically with the huge amount of resources on the web. In this way, there is a solid need to
distinguish fake products and blockchain innovation is utilized to recognize counterfeit products. Moreover, the data is encoded into
a block of code. Admin will upload the product details. Customers examine the product details using the product id and then
distinguish whether the product is original or fake. Thus, the proposed framework is valuable for the customers to identify
counterfeit products in the production network. Customers can verify the product purchased using the product id and can get all the
product details.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1847
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
REFERENCES
[1] J. Leng, "Makerchain: A blockchain with chemical signature for self organizing process in social manufacturing,", 2019.
[2] N. Alzahrani, “Block-supply chain: A new anti-counterfeiting supply chain using NFC and blockchain,” 2018.
[3] M. Rosenfeld, “Overview of colored coins,” White paper, bitcoil. co. il, p. 41, 2012.
[4] Litecoin, https://litecoin.info/index.php/Main Page, 2018.
[5] V. Buterin et al., “Ethereum white paper,” GitHub repository, 2013.
[6] G. Wood, “Ethereum: A secure decentralized generalized transaction ledger,” Ethereum project yellow paper, vol. 151, pp. 1–32, 2014.
[7] Hyperledger, https://www.hyperledger.org/, 2018.
[8] Abra, https://www.abra.com/, 2018.
[9] tzero, https://www.tzero.com/, 2018.
[10] S. Panikkar, S. Nair, P. Brody, and V. Pureswaran, “Adept: An iot practitioner perspective,” DRAFT COPY FOR ADVANCE REVIEW, IBM, 2015.
[11] Cryptokitties, https://www.cryptokitties.co/, 2018.
[12] Augur,https://www.augur.net/, 2018.
[13] Agora voting, https://www.agora.vote/, 2018.
[14] hirego, https://www.hirego.io/, 2018.
[15] S. M. English and E. Nezhadian, “Application of bitcoin data structures design principles to supply chain management,” arXiv preprint arXiv:1703.04206,
2017.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1848