The present disclosure relates to blockchain systems and methods for protecting brands, operators and consumers against counterfeiting of products.
Blockchain technology uses a distributed ledger system in which the data associated with transactions is cryptographically encoded and stored as blocks in the ledger. In the distributed ledger, the blocks are cryptographically linked to one another to form a “chain” in such a way that data stored in the ledger is virtually impossible to delete or modify. The ledger is “distributed” in that every node on the blockchain network has a copy of the ledger and receives a copy of the updated ledger anytime a new transaction on the blockchain is performed and the corresponding cryptographically-encoded data is added as a block on the chain.
Each user, i.e., node, on the network has a private key and a public key. The public keys are used by the nodes on the network to identify and communicate with one another, whereas each user's private key, which is not known to the other users of the network, is needed to perform transactions. The public and private keys are used in cryptographic hashing algorithms to perform transactions that result in the cryptographically-encoded blocks being added to the chain once they have been validated. In general, when a user requests a transaction on the network, a cryptographically-encoded block is created and broadcast to all of the nodes on the network. Nodes of the network have processors that perform a consensus algorithm that processes the block to validate it. Once the block is validated, it is added to the ledger and the updated ledger is broadcast to all the nodes of the network.
Blockchain networks vary depending on the type of blockchain technology used, but they all have the above attributes in common. Because it is virtually impossible to delete or modify data stored in the blockchain, blockchain networks are well suited for use in performing a variety of business transactions and for transacting cryptocurrency. In cryptocurrency blockchain networks, fungible tokens (FTs) represent the currency that is transacted, whereas in other types of blockchain networks, non-fungible tokens (NFTs) are used to represent non-fungible items, such as collectible items (e.g., baseball cards, art work, etc.), which can often be purchased on the network using cryptocurrency. FTs and NFTs are cryptographically-encrypted, and transactions that involve them become cryptographically-encrypted blocks of the distributed ledger.
Although the cryptographic linking attributes of blockchain networks and the distributed nature of the ledger make it virtually impossible to modify/delete data that becomes part of the blockchain, it is still possible in some cases to counterfeit NFTs or to attach an authentic NFT to packaging of a counterfeit item, which can result in harm to the consumer, the operator (i.e., the manufacturer and/or authorized distributor) and/or to the brand used in connection with the authentic item. Counterfeiting of brands is an epidemic in many industries due to large amounts of money spent in illicit markets. Counterfeit brands degrade brand reputation and can diminish brand value, resulting in risks to brand licensing revenues. Purchasing inauthentic products and selling them in illicit markets is also a liability to operators or owners of the authentic brands. In addition, the purchase by consumers of substandard and/or unsafe counterfeit products can not only endanger consumers, but can cause harm to businesses having authentic brands. Consuming counterfeit products can also be harmful due to lack of regulation and testing standards, as demonstrated by recent vaping crises, for example.
Accordingly, a need exists for a blockchain system and method that better protect consumers, brands and operators against counterfeiting of items.
The present disclosure is directed to systems and methods for using a blockchain network to protect items from being counterfeited.
In accordance with an embodiment of the method performed by the blockchain system, the method comprises:
In accordance with an embodiment, the method, further comprises disposing the scannable code having the NFT encoded therein on the packaging label.
In accordance with an embodiment, the method further comprises disposing the packaging label on the package or container.
In accordance with an embodiment, the item comprises at least one of something that was grown, something that was raised, something that was manufactured and something that was created.
For cases in which the item was grown, and the preselected data that is used to generate the NFT for the item comprises at least one of (1) information identifying what the item is, (2) information identifying a particular farm where the item was grown, (3) a date that the item was harvested, (4) any brand associated with the item, information identifying a batch to which the item belongs, (5) information identifying a party or association that grew the batch, (6) information identifying any certifications associated with the item, (7) information identifying any tests that have been performed on the item or on the corresponding batch, and (8) any test results associated with testing of the item or the corresponding batch.
For cases in which the item was manufactured or created, the preselected data that is used to generate the NFT comprises at least one of (1) information identifying what the item is, (2) information identifying the manufacturer or creator, (3) information identifying the manufacturing facility, (4) information identifying a batch to which the item belongs, (5) information identifying a part number, model number or name for the item, (6) information identifying a style of the item, (7) any brand name associated with the item, (8) information identifying any certifications associated with the item, (9) information identifying any tests that have been performed on the item or the batch, (10) information identifying any testing results associated with testing of the item or the corresponding batch.
In accordance with an embodiment, generating the NFT comprises:
In accordance with an embodiment, generating the NFT further comprises:
In accordance with an embodiment, a handheld device performs a method for authenticating an item using a blockchain network. The method comprises:
In accordance with an embodiment of the method performed by the blockchain network: receiving an authentication request from a handheld device, the authentication request comprising a unique identifier (ID) obtained from a nonfungible token (NFT) that was embedded in a scannable code disposed on a packaging label of a package or container for the item
In accordance with an embodiment of the blockchain system for using a blockchain network to protect items from being counterfeited, the system comprises:
In accordance with an embodiment of the blockchain system, at least one of the blockchain algorithms comprises a security algorithm that determines whether the scanning of a scannable code on a packaging label indicates that the transaction being attempted should not be trusted. The security algorithm performs the following:
In accordance with an embodiment of a handheld device being configured to authenticate items using a blockchain network, the handheld device comprises:
These and other features and advantages will become apparent from the following description, drawings and claims.
The example embodiments are best understood from the following detailed description when read with the accompanying drawing figures. It is emphasized that the various features are not necessarily drawn to scale. In fact, the dimensions may be arbitrarily increased or decreased for clarity of discussion. Wherever applicable and practical, like reference numerals refer to like elements.
The present disclosure is directed to various representative embodiments of a blockchain system and methods that are used in the blockchain system to authenticate items and to detect counterfeit items. Some embodiments of the present disclosure are directed to processes that are performed by a handheld device while other embodiments of the present disclosure are directed to processes that are performed by one or more processors of the blockchain network.
In accordance with a preferred embodiment of the blockchain system and methods,ssss for each item to be authenticated in the blockchain network, the item's label will display a scannable code, such as a Quick Response (QR) code, for example, which is a two-dimensional (2-D) matrix pattern comprising encoded data. For each item to be authenticated by the blockchain system, an NFT is created and encoded into the scannable code. The handheld device is used to scan the scannable code, convert the scanned code into a data signal, extract the NFT from the data signal, process the NFT to obtain a unique identification (ID) of the item associated with the NFT, and forward the unique ID to the blockchain network. The blockchain network then processes the unique ID to authenticate the item associated with the NFT, retrieves the data that was used to create the NFT from memory if authentication is successful, and forwards the retrieved data to the handheld device. The handheld device receives the forwarded data, processes it and causes it to he displayed on the display device of the handheld device to show the user that the item has been successfully authenticated by the blockchain network.
The NFT typically has multiple layers of cryptographic protection and is linked to the blockchain network, which preferably is a permissioned, private blockchain network that stores the NFTs for all of the items in a distributed ledger comprising the blockchain. For each authorized operator (i.e., manufacturer, distributor and/or creator of items) of the blockchain network, an NFT is created for each of the operator's items. There can he many authorized operators and each operator can be a manufacturer, distributor and/or creator of multiple items. For each item, there is a unique NFT. The NFTs are interlinked in the blockchain and the encrypted chain of interlinked NFTs becomes more complex as new NFTs associated with new items are created and added to the blockchain, thus making the NFTs virtually impossible to reproduce or counterfeit.
As indicated above, each NFT has a unique ID associated with it that is cryptographic in nature and preferably is generated using multiple hardened cryptographic algorithms (primarily hashing and signing), thereby making the NFTs extremely difficult to brute-force hack. This ensures that a new NFT cannot simply be generated and cloned on the fly. This also protects against brute-force attacks of the type that ping the application program interface (API) of a computer of the blockchain network asking it for IDs that most likely exist and the data associated with those IDs, which could then be used on to compromise the entire blockchain network in a relatively small amount of time and with a relatively small amount of effort. The cost, resources, and time associated with any attempt to brute-force hack the IDs of the blockchain system of the present disclosure (i.e., the amount of time, effort and resources needed to guess an ID) would be extremely high, making it extremely difficult, if not impossible, to succeed in the attack. In addition, because there are multiple NFTs in the blockchain network of the present disclosure that are cryptographically related, a hacker would have to “guess” more than just one ID to succeed in such an attack.
To add further security to the blockchain system of the present disclosure, the blockchain system and method preferably implement a security algorithm that detects hacking-type behavior and automatically flags such behavior to indicate to the user that an item may be a counterfeit, and the security algorithm can be configured to impose penalties and/or restrictions on the associated account/ID. Furthermore, the security algorithm can be configured to detect labels being scanned in an unusual, undesired and/or odd pattern and to react to this type of attack. Thus, the security algorithm preferably employs a reactive security model. For example, the security algorithm can be configured to determine whether a label has been scanned more times than a preselected threshold (TH) number of times and notify the user or customer that the number of times that the label has been scanned could indicate that the item is counterfeit and/or that the transaction being attempted is invalid.
As another example, the security algorithm can be configured to detect when the age of an item having the label being scanned is beyond a preselected TH age and alert the user or customer that the item may be beyond a suitable age, such as in cases in which the item is an organic product. The security algorithm can be configured in such a way that after the detection of such an event, anyone scanning the scannable code of the label of that item is notified that the item may be compromised or cloned. Additionally, other security measures can be included, such as including invisible ink or a specific type of ink on the labels that can be observed under UV light to aid users in determining whether an item's label is authentic.
In the following detailed description, for purposes of explanation and not limitation, exemplary, or representative, embodiments disclosing specific details are set forth in order to provide a thorough understanding of an embodiment according to the present teachings. However, it will be apparent to one having ordinary skill in the art having the benefit of the present disclosure that other embodiments according to the present teachings that depart from the specific details disclosed herein remain within the scope of the appended claims. Moreover, descriptions of well-known apparatuses and methods may be omitted so as to not obscure the description of the example embodiments. Such methods and apparatuses are clearly within the scope of the present teachings.
The terminology used herein is for purposes of describing particular embodiments only and is not intended to be limiting. The defined terms are in addition to the technical and scientific meanings of the defined terms as commonly understood and accepted in the technical field of the present teachings.
As used in the specification and appended claims, the terms “a,” “an,” and “the” include both singular and plural referents, unless the context clearly dictates otherwise. Thus, for example, “a device” includes one device and plural devices.
Relative terms may be used to describe the various elements' relationships to one another, as illustrated in the accompanying drawings. These relative terms are intended to encompass different orientations of the device and/or elements in addition to the orientation depicted in the drawings.
It will be understood that when an element is referred to as being “connected to” or “coupled to” or “electrically coupled to” another element, it can be directly connected or coupled, or intervening elements may be present.
The term “memory” or “memory device”, as those terms are used herein, are intended to denote a non-transitory computer-readable storage medium that is capable of storing computer instructions, or computer code, for execution by one or more processors. References herein to “memory” or “memory device” should be interpreted as one or more memories or more memory devices. The memory may, for example, be multiple memories within the same computer system. The memory may also be multiple memories distributed amongst multiple computer systems or computing devices.
A “processor”, as that term is used herein encompasses an electronic component that is able to execute a computer program or executable computer instructions. References herein to a computer comprising “a processor” should be interpreted as one or more processors or processing cores. The processor may for instance be a multi-core processor. A processor may also refer to a collection of processors within a single computer system or distributed amongst multiple computer systems. The term “computer” should also be interpreted as possibly referring to a collection or network of computers or computing devices, each comprising a processor or processors. Instructions of a computer program can be performed by multiple processors that may be within the same computer or that may be distributed across multiple computers.
A “handheld device”, as that term is used herein, refers to any device that is adapted to be held in the hand of a user and having one or more processors that can be configured to perform the computer algorithms described below as being performed by a handheld device, such as, for example, a smart phone, a notebook or laptop computer, a personal digital assistant (PDA), a scanning device such as a scannable code reader used at POSs to scan items being purchased, a digital tablet, etc.
An “operator,” as that term is used herein, denotes a manufacturer, distributor and/or creator of items for which an NFTs are created in accordance with the present disclosure.
Exemplary, or representative, embodiments will now be described with reference to the figures, in which like reference numerals represent like components, elements or features. It should be noted that features, elements or components in the figures are not intended to be drawn to scale, emphasis being placed instead on demonstrating inventive principles and concepts.
Once the steps represented by blocks 101-103 have been performed, the scannable code having the NFT encoded therein can be printed on, embedded in or otherwise disposed on a label that will be, or already has been, attached to or disposed on the item, as indicated by block 104. The steps of producing the label and causing the scannable code having the NFT encoded therein to be disposed on the label can be performed as part of the method represented by
The steps represented by blocks 101-103 can be implemented in a number of ways that can vary depending on the blockchain network in which the method is employed. For example, if the method is employed in a private blockchain network, the computer code that is used to generate the NFT, link it to the blockchain network and encode it into a scannable code can be very different from the computer code that would be used for these purposes if the method is employed in a public blockchain network, such as the Ethereum blockchain network, for example. For the Ethereum blockchain network, there is a specific algorithm that is used for minting NFTs and linking them to the Ethereum blockchain network, which can be different from the process used in block 101. The processes represented by block 101 could be the same as, for example, the Ethereum minting and linking processes, but could also be different from those processes. An example of the processes represented by blocks 101-103 performed in the assignee's private blockchain network is described below with reference to
When the blockchain network receives the unique ID in an authentication request from the handheld device, one or more processors of the blockchain network attempt to authenticate the item associated with the request. The unique ID received from the handheld device is encrypted. Authentication can be performed in a number of ways. In cases in which the blockchain network is a public blockchain network, authentication is typically performed by having multiple processors of the blockchain network located at different nodes of the network simultaneously perform a consensus algorithm. A variety of known consensus algorithms, and variations thereof, can be used for this purpose, including, for example, the proof of work algorithm, the proof of stake algorithm, the proof of elapsed time algorithm, the byzantine fault tolerance algorithm, etc. A new consensus algorithm can also be used for this purpose. In accordance with a preferred embodiment, the blockchain network is a private network, or at least the portion of the blockchain network that is responsible for creating NFTs and for performing authentication is a private, permissioned network. In accordance with this preferred embodiment, a single processor or computer of the private portion or private network performs one or more blockchain algorithms that decrypt the encrypted unique ID to perform authentication, retrieve the associated NFT data from memory and forward the NFT data to the handheld device.
If authentication is successful, the transaction becomes a block in the blockchain network and the distributed ledger of the blockchain network is updated to include the block. Each node in the network then receives a copy of the updated ledger. The handheld device receives the NFT data and displays it on a display device to the user, as indicated by block 206.
In cases in which the blockchain network is a private blockchain network, it is not necessary for multiple processors at multiple nodes to simultaneously perform NFT mining (i.e., performing a consensus algorithm to authenticate the transaction and then updating a distributed ledger), but doing so can increase the robustness and security of the blockchain network. For example, in a private blockchain network, a dedicated server can be responsible for receiving the authentication request, performing any algorithms for decrypting the encrypted unique ID, retrieving the NFT data associated with the unique ID, forwarding the NFT data to the handheld device, and updating its own ledger. In private blockchain networks, other features can be implemented in those networks to enhance security and prevent the network from being compromised by unauthorized users that may attempt attacks on the network.
It should be noted that the inventive principles and concepts of the present disclosure are not limited to the real-world item being any particular type of item. The item can be, for example, something that is grown (e.g., fruit, vegetables, cannabis), something that is raised (e.g., poultry, meat, fish, etc.), something that has been manufactured (e.g., clothing, personal accessories, jewelry), something that has been created (e.g., art work, a music recording, a video recording), etc. The inventive principles and concepts are suitable for use with any item for which it is desirable to enable validation or authentication of the item to prevent or detect counterfeiting of the item or fraudulent transactions involving the item.
The process represented by the flow diagram of
The data that is formatted into the JSON-formatted data object will typically be data that identifies and characterizes the item for which the NFT is being created. For example, if the item is an organic item that is grown on a farm, the data may comprise one or more of, for example, information identifying what the item is, information identifying the particular farm where the item was grown, the date that the item was harvested, any brand associated with the item, information identifying the batch to which the item belongs, information identifying the party or association that grew the batch, information identifying any certifications associated with the item (e.g., a Farm Organic Certification), information identifying any tests that have been performed on the item or on the corresponding batch, any test results associated with testing of the item or the corresponding batch, etc. The latter two types of information can be useful in cases in which it may be desirable for the NFT to include a record of evidence showing compliance with regulations or statutes of a governmental organization (e.g., the Food and Drug Administration (FDA)).
In the case where the item is an article of manufacture, such as, for example, a piece of jewelry, a handbag, purse or pocketbook, a consumer electronic device, a vehicle, etc., the data that is used to identify and characterize the item may be one or more of, for example, information identifying what the item is, information identifying the manufacturer, information identifying the manufacturing facility, information identifying the batch to which the item belongs, information identifying the part number, model number and/or name for the item, information identifying the style of the item, any brand name associated with the item, information identifying any certifications that have been achieved, information identifying any tests that have been performed on the item or the batch, information identifying any testing results, etc.
The data that is used for the purposes of identifying and characterizing the item can be any information that meaningfully identifies and characterizes the item. The inventive principles and concepts of the present disclosure are not limited with respect to the type of data that is used to identify and characterize the item. One of the primary purposes of blockchain networks is to ensure that ownership and provenance can be verified with certainty, thereby preventing counterfeiting or invalid transfers of the NFTs. Therefore, any data that is useful or suitable for this purpose can be included in the structured data object.
In the step represented by block 402 in the flow diagram of
In the step represented by block 403, the checksum is cryptographically signed using the owner's or operator's private key, which is part of the blockchain of private portion of the blockchain network and is not known outside of the private portion except to the owner or operator of the item. The terms “owner” and “operator” are used herein to denote the manufacturer or creator of the original item. The process represented by block 403 generates a computed signature.
In the step represented by block 404, the computed signature is appended to the JSON-formatted data object generated at step 401 to produce the NFT. In the step represented by block 406, an optional compression algorithm is performed that processes the NFT in accordance with a compressed binary data structure algorithm to produce a compressed binary NFT. Compressing the NFT prior to storing it in memory in the blockchain network reduces the amount of “gas”, or processing overhead, that is needed by the blockchain network to process and store the NFT and to later perform the consensus algorithm(s) that is used to verify the authenticity of the NFT. Reducing the amount of processing overhead that is needed for this purpose is important since the NFT will be cryptographically linked to other blocks of the blockchain.
In the step represented by block 407, the compressed binary NFT is stored in the blockchain and linked to the owner's public key. The stored NFT with the link to the owner's public key is now considered immutable and can be verified using a process similar to that described above, as will be described below in more detail with reference to
In the step represented by block 408, the cryptographic certificate comprising the NFT is used to generate a unique URL of an existing URL structure of a preselected domain. In the step represented by block 409, the unique URL is modified by concatenating the computed signature generated at block 403 to the URL generated at block 408 to generate the unique ID for the item discussed above, which preferably is a UTF-8 valid ID. Creating the unique ID in this manner ensures that no ID used in the blockchain network is the same as any other ID used in the blockchain network and that the IDs can be safely used in a URL scheme for any number of NFTs created in the future. An example of a URL created by the process of block 409 is: https://example.com/NFT/ID(PUBLICKEY_SIGNED(CHECKSUM(NFT/CRYPTOGRAPH IC CERTIFICATE))).
At the step represented by block 410, the unique ID comprising the signature concatenated to the unique URL is stored inside of a scannable code, such as QR code, for example. Although other types of scannable codes can be used for this purpose, the remainder of the present disclosure assumes that a QR code is used for this purpose. As will be described below in more detail with reference to
It should be noted that the processes described above with reference to the flow diagram of
In accordance with the present disclosure, NFT ownership and provenance can be verified by a user or customer at a point-of-sale (POS) location or terminal. For this purpose, a representative embodiment of the present disclosure is directed to an embodiment in which the handheld device comprises a smart phone that executes a smart phone app that scans the scannable code discussed above, processes the output of the scan and communicates with one or more processors of the private portion of the blockchain network to retrieve the NFT data and cause it to be displayed on the display device of the smart phone to allow the user to verify ownership and provenance of the NFT. As will be described below in more detail with reference to
With reference to block 501 of the flow diagram of
When the user clicks the banner, as indicated by block 502, the URL is opened in the default web browser app of the phone, which can be any web browser, but is typically a Google Chrome/Blink-based, a Safari/Webkit-based web browser, a Firefox web browser, etc. The web browser app loads the URL, thereby causing the phone to be connected to a network address at which a link to executable computer instructions is located. The link to the executable instructions can be displayed to the user on the display of the smart phone. If the smart phone app of the present disclosure is already installed on the user's smart phone, the default of the smart phone app preferably is to automatically open the displayed link and execute the corresponding computer instructions on the processor of the smart phone. Alternatively, the smart phone app of the present disclosure can display a prompt that prompts the user to click on the link in order to cause the computer instructions to be executed.
If the smart phone app of the present disclosure is not already installed on the user's smart phone at this time, preferably the user's smart phone connects to the default app store on the smart phone and the user is prompted to download the smart phone app of the present disclosure. Once the smart phone app of the present disclosure has been installed on the smart phone, the link to the executable computer instructions is opened. When the smart phone opens the link and the processor executes the computer instructions, it extracts the unique ID from the URL that was modified at step 409 of
Some of the processes represented by block 503 are performed by one or more processors of the smart phone and some of the processes represented by block 503 are performed by one or more processors of the blockchain system. The smart phone app of the present disclosure and the software executed by one or more processors of the blockchain system are configured to interact with one another to perform all of the tasks associated with the various layers typically involved in blockchain technology, such as, for example, the application layer, the services layer, the semantic layer, the network layer and the infrastructure layer. Because persons of skill in the art understand the manner in which hardware and software can be configured to perform the processes associated with the various layers of a blockchain network, a detailed discussion of the hardware and software implementations used for this purpose are not described herein in the interest of brevity.
The processes represented by blocks 501 and 502 can be performed using known functionality that is currently implemented in smart phones today. As indicated above, smart phones available today typically have a camera app with scannable code reading support that reads a QR code and causes a web browser app of the smart phone to link to an address on the Internet. The smart phone app of the present disclosure can be configured to interact with such existing apps to cause the smart phone to connect to the address at which the link to the executable computer instructions of the present disclosure is located, at which point the smart app of the present disclosure can be automatically triggered to open the link and execute the executable computer instructions that cause the processes represented by block 503 to be performed. Alternatively, the smart phone app of the present disclosure can be integrated with the camera app having scannable code reading functionality.
The nodes 6301-630N are interconnected by a network that allows them to communicate with one another, and each of the nodes 6301-630N comprises one or more processors that are configured to allow the nodes to perform operations such as those described above with reference to blocks 101-103 of
When the processes of
The node 630 comprises a processor 700 that is configured to perform the blockchain algorithms described above, which are represented in
In addition to these blockchain algorithms 710, in some embodiments, the processor 700 is configured to perform one or more of the aforementioned security algorithms 730. The computer instructions for implementing these security algorithms 730 can also be stored in memory device 720.
When the blockchain system 610 detects that a scannable code has been scanned at block 801, one or more of the nodes 6301-630N determine, based on some preselected criteria, whether the transaction being attempted is a bona fide attempt or an unauthorized attempt, as indicated by block 802. The determination that is made at block 802 as part of the security algorithm 730 can be made as part of the blockchain algorithms 710 or it can be a separate determination that is made before or after the blockchain algorithms 710 have been performed. For example, the determination of block 802 can be made after the process represented by block 303 of
As another example, the determine of block 802 can be made after the process represented by block 301 of
The criteria that are used to make the determination of block 802 can include one or more factors that indicate a likelihood that the transaction being attempted is not bona fide or authorized. As indicated above, the security algorithm can be configured to detect labels being scanned in an unusual, undesired and/or odd pattern and to react to this type of attack. At block 802, the blockchain system 610 can analyze the distributed ledger to determine whether or not the label associated with the unique ID that was received in the authentication request from the handheld device has been scanned multiple times, the locations at which those scans occurred, the dates and times when the scans occurred, the amount of time that lapsed between the time that the most recent scan occurred and when the item associated with the unique ID was first created. one or more of these criteria can be used to determine the likelihood that the transaction being attempted is bona fide or authorized.
For example, if the same label was scanned on the same day at two different locations, the security algorithm can analyze the dates, times and locations of those scans and determine that there is a high likelihood that the transaction being attempted is fraudulent. As another example, the security algorithm can determine that a transaction being attempted is not a bona fide transaction if the security algorithm determines that a label has been scanned more than a preselected TH number of times. As another example, the security algorithm can determine that the transaction being attempted is fraudulent or unauthorized if the length of time between the date on which the current scan occurred and the date on which the item was created indicates that the item has exceeded its life expectancy or is beyond a suitable age, such as in cases in which the item is an organic product. All of this information can be can be stored in the distributed ledger for each NFT that is created and for any transactions that have occurred relating to each NFT.
At block 803, the user is notified of the determination that was made at block 802. This can be accomplished by the display device of the handheld device displaying a message to the user informing the user of the determination that was made at block 802, such as a message that informs the user that, for example, the item may be a counterfeit or clone, the item may be beyond a suitable age for consumption, the item was previously purchased, multiple attempts have been made to purchase the item, etc. The security algorithm can be configured in such a way that after the detection of such an event, anyone scanning the scannable code of the label of that item is notified that the item may be compromised or cloned. The notification can be any notification that suitably alerts the user and it can be audio, visual, audio-visual.
It should be noted that the inventive principles and concepts have been described with reference to representative embodiments, but that the inventive principles and concepts are not limited to the representative embodiments described herein. Although the inventive principles and concepts have been illustrated and described in detail in the drawings and in the foregoing description, such illustration and description are to be considered illustrative or exemplary and not restrictive; the invention is not limited to the disclosed embodiments. Other variations to the disclosed embodiments can be understood and effected by those skilled in the art, from a study of the drawings, the disclosure, and the appended claims.