SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Fake Product Identification
Using Block Chain
Presentation Outline
● Introduction
● Objectives
● Technology Platform Overview
● Application Feature Overview
● Implementation
● Application Snapshots
● Evaluation
● Future Work
● Conclusion
Introduction
● Supply chain counterfeiting is a universal problem that plagues almost every industry.
● There are counterfeit electronic components, car parts, consumer goods,
pharmaceuticals — even counterfeit wines.
● A blockchain is a kind of dispensed ledger that is designed to prevent tampering.
● Primarily based on the allotted consensus Set of rules, clever contracts and encrypted
algorithms [3].
● Blockchain generation facilitates to clear up the Problem of counterfeiting of a product.
Objectives of the Project
● The goal of our project is to find whether a given product is fake or original
using Blockchain Technology.
● To ensure the identification and traceability of real product throughout the
supply chain ,we propose a fully functional Blockchain system to prevent
product counterfeting , for what are creating web interface for the user to scan
the information of the product through the product QR code.
Technology Platform
● Tools : Xampp
● Language : Solidity
● IDE’s : Visual Studio 2019 and Remix Ethereum IDE (online) Metamask wallet
● Ganache (personal blockchain).
● Front End : Html,CSS,Javascript,Bootstrap,SCSS.
Advantages of Proposed System
● It enables easy traceability of products through QR code scanning and
location tracking.
● It enables easy registering of products into blockchain and QR code
generation along with product ID.
● No data Immutability will take place so that it provides security to our data.
● It is a distributed ledger.
Implementation
Required tools and software to develop “Fake Product Identification Using Block -
Chain” application are mentioned below:
● IDE’s : Visual Studio 2019
● Remix Ethereum IDE (online)
● Metamask wallet
● Ganache (personal blockchain).
Algorithm
● Signup to blockchain as manufacturer or distributor or consumer or retailer.
● login to blockchain .
● scan the QR along with location.
● deduct ETH from wallet for each scanning update the details in blockchain.
● Verify the received product By scanning the QR code.
● if image is QR code and generated by blockchain than product details are shown.
● Logout of the transactions.
Software Testing
The testing steps are:
● Unit Testing.
● Integration Testing.
● Validation Testing.
● User Acceptance Testing.
Unit Testing
● Unit testing, also known as component testing.
● It refers to tests that verify the functionality of a specific section of code,
usually at the function level.
● In an object-oriented environment, this is usually at the class level.
● Minimal unit tests include the constructors and destructors.
Integration Testing
● Integration testing is any type of software testing that seeks to verify the
interfaces between components against a software design.
● Integration testing works to expose defects in the interfaces and interaction
between integrated components (modules).
Validation Testing
● Validation testing can be defined in many ways; here the testing validates the
software function in a manner that is reasonably expected by the customer.
● It may also be referred to as software quality control.
User Acceptance Testing
● Performance of an acceptance test is actually the user’s show.
● All the above testing strategies were done using the following test case
designs:
➢ Manufacturer
➢ Distributer
➢ Retailer
➢ Consumer
➢ Login
Snapshots
● This section highlights the result of the project & the snapshots for each of the
activities are shown along with the discussion of each activity describing its
working.
● Every snapshots describes every single step of the “Fake Product
Identification Using BlockChain”.
Future Work
● Future works could be to simplify the code.
● Customers will not be aware of Blockchain based E-Commerce websites or
platform.
● so to make customers buy the product from this website.
● They need to know how this website is different from other shopping platform
and website and the advantages this platform has.
Learning from the Project
● Web App Development.
● Familiarity with Integrated Development Environment (IDE).
● Solidity Basic.
● Use of Bootstrap and other front end Technology for Layout.
● Web App running and deployment.
● Different Technique of debugging web application.
Conclusion
● Using Blockchain technology to stop counterfeiting of the product could
benefit the e-commerce companies as well as the customers.
● The manufacturer, distributor and customer will have the information of the
product all the way from the time it gets manufactured to the time it reaches
the customer.
● And it is almost impossible for a third party or a hacker to change the
information of the product between any of the links in blockchain.
Thanking You!

Weitere ähnliche Inhalte

Was ist angesagt?

Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
kalpesh1908
 

Was ist angesagt? (20)

Ppt on blockchain technology
Ppt on blockchain technologyPpt on blockchain technology
Ppt on blockchain technology
 
Web scraping
Web scrapingWeb scraping
Web scraping
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Presentation on brain driven car
Presentation on brain driven carPresentation on brain driven car
Presentation on brain driven car
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Fraud detection with Machine Learning
Fraud detection with Machine LearningFraud detection with Machine Learning
Fraud detection with Machine Learning
 
Agriculture on blockchain
Agriculture on blockchainAgriculture on blockchain
Agriculture on blockchain
 
Credit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning AlgorithmsCredit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning Algorithms
 
AI & Blockchain: An Introduction
AI & Blockchain: An IntroductionAI & Blockchain: An Introduction
AI & Blockchain: An Introduction
 
Brain chips ppt
Brain chips pptBrain chips ppt
Brain chips ppt
 
Braingate technology
Braingate technologyBraingate technology
Braingate technology
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Money pad ppt
Money pad pptMoney pad ppt
Money pad ppt
 
Lecture 4 neural networks
Lecture 4 neural networksLecture 4 neural networks
Lecture 4 neural networks
 
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
 
Bitcoin Price Prediction
Bitcoin Price PredictionBitcoin Price Prediction
Bitcoin Price Prediction
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Technical seminar on virtual smart phone
Technical seminar on virtual smart phoneTechnical seminar on virtual smart phone
Technical seminar on virtual smart phone
 
Traffic sign recognition
Traffic sign recognitionTraffic sign recognition
Traffic sign recognition
 

Ähnlich wie Final (3).pptx

Ähnlich wie Final (3).pptx (20)

How to Create Blockchain Products by Slice.Market CTO
How to Create Blockchain Products by Slice.Market CTOHow to Create Blockchain Products by Slice.Market CTO
How to Create Blockchain Products by Slice.Market CTO
 
How to Create Blockchain Products by Fr8 Network Lead Engineer
How to Create Blockchain Products by Fr8 Network Lead EngineerHow to Create Blockchain Products by Fr8 Network Lead Engineer
How to Create Blockchain Products by Fr8 Network Lead Engineer
 
Fake Product Identification using Blockchain Technology
Fake Product Identification using Blockchain TechnologyFake Product Identification using Blockchain Technology
Fake Product Identification using Blockchain Technology
 
Self checkout application presentation
Self checkout application presentationSelf checkout application presentation
Self checkout application presentation
 
Dev ops presentation
Dev ops presentationDev ops presentation
Dev ops presentation
 
Crypton Studio Presentation
Crypton Studio PresentationCrypton Studio Presentation
Crypton Studio Presentation
 
Intro to Automation Using Perfecto's CQ Lab
Intro to Automation Using Perfecto's CQ LabIntro to Automation Using Perfecto's CQ Lab
Intro to Automation Using Perfecto's CQ Lab
 
[WSO2 Integration Summit Singapore 2019] Achieving Predictable Success in Dig...
[WSO2 Integration Summit Singapore 2019] Achieving Predictable Success in Dig...[WSO2 Integration Summit Singapore 2019] Achieving Predictable Success in Dig...
[WSO2 Integration Summit Singapore 2019] Achieving Predictable Success in Dig...
 
A Modern Dive into QA Automation and Beyond
A Modern Dive into QA Automation and BeyondA Modern Dive into QA Automation and Beyond
A Modern Dive into QA Automation and Beyond
 
Python Development - V2STech Corporate presentation
Python Development - V2STech Corporate presentationPython Development - V2STech Corporate presentation
Python Development - V2STech Corporate presentation
 
Open source iam value, benefits, and risks
Open source iam  value, benefits, and risksOpen source iam  value, benefits, and risks
Open source iam value, benefits, and risks
 
Computer Vision based Automated Spare Part Finder App.pptx
Computer Vision based  Automated Spare Part Finder App.pptxComputer Vision based  Automated Spare Part Finder App.pptx
Computer Vision based Automated Spare Part Finder App.pptx
 
AnitaB-Atlanta-CyberSecurity-Weekend-Rana-Khalil.pdf
AnitaB-Atlanta-CyberSecurity-Weekend-Rana-Khalil.pdfAnitaB-Atlanta-CyberSecurity-Weekend-Rana-Khalil.pdf
AnitaB-Atlanta-CyberSecurity-Weekend-Rana-Khalil.pdf
 
How Virtual Compilation Transforms Static Code Analysis
How Virtual Compilation Transforms Static Code AnalysisHow Virtual Compilation Transforms Static Code Analysis
How Virtual Compilation Transforms Static Code Analysis
 
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
 
Debug, Analyze and Optimize Games with Intel Tools
Debug, Analyze and Optimize Games with Intel Tools Debug, Analyze and Optimize Games with Intel Tools
Debug, Analyze and Optimize Games with Intel Tools
 
Debug, Analyze and Optimize Games with Intel Tools - Matteo Valoriani - Codem...
Debug, Analyze and Optimize Games with Intel Tools - Matteo Valoriani - Codem...Debug, Analyze and Optimize Games with Intel Tools - Matteo Valoriani - Codem...
Debug, Analyze and Optimize Games with Intel Tools - Matteo Valoriani - Codem...
 
Debug, Analyze and Optimize Games with Intel Tools - Matteo Valoriani - Codem...
Debug, Analyze and Optimize Games with Intel Tools - Matteo Valoriani - Codem...Debug, Analyze and Optimize Games with Intel Tools - Matteo Valoriani - Codem...
Debug, Analyze and Optimize Games with Intel Tools - Matteo Valoriani - Codem...
 
SMTAI PowerPoint: Blockchain for High Tech
SMTAI PowerPoint: Blockchain for High Tech SMTAI PowerPoint: Blockchain for High Tech
SMTAI PowerPoint: Blockchain for High Tech
 
MongoDB World 2019: Building Flexible and Secure Customer Applications with M...
MongoDB World 2019: Building Flexible and Secure Customer Applications with M...MongoDB World 2019: Building Flexible and Secure Customer Applications with M...
MongoDB World 2019: Building Flexible and Secure Customer Applications with M...
 

Kürzlich hochgeladen

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Kürzlich hochgeladen (20)

FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 

Final (3).pptx

  • 1.
  • 3. Presentation Outline ● Introduction ● Objectives ● Technology Platform Overview ● Application Feature Overview ● Implementation ● Application Snapshots ● Evaluation ● Future Work ● Conclusion
  • 4. Introduction ● Supply chain counterfeiting is a universal problem that plagues almost every industry. ● There are counterfeit electronic components, car parts, consumer goods, pharmaceuticals — even counterfeit wines. ● A blockchain is a kind of dispensed ledger that is designed to prevent tampering. ● Primarily based on the allotted consensus Set of rules, clever contracts and encrypted algorithms [3]. ● Blockchain generation facilitates to clear up the Problem of counterfeiting of a product.
  • 5. Objectives of the Project ● The goal of our project is to find whether a given product is fake or original using Blockchain Technology. ● To ensure the identification and traceability of real product throughout the supply chain ,we propose a fully functional Blockchain system to prevent product counterfeting , for what are creating web interface for the user to scan the information of the product through the product QR code.
  • 6. Technology Platform ● Tools : Xampp ● Language : Solidity ● IDE’s : Visual Studio 2019 and Remix Ethereum IDE (online) Metamask wallet ● Ganache (personal blockchain). ● Front End : Html,CSS,Javascript,Bootstrap,SCSS.
  • 7. Advantages of Proposed System ● It enables easy traceability of products through QR code scanning and location tracking. ● It enables easy registering of products into blockchain and QR code generation along with product ID. ● No data Immutability will take place so that it provides security to our data. ● It is a distributed ledger.
  • 8. Implementation Required tools and software to develop “Fake Product Identification Using Block - Chain” application are mentioned below: ● IDE’s : Visual Studio 2019 ● Remix Ethereum IDE (online) ● Metamask wallet ● Ganache (personal blockchain).
  • 9. Algorithm ● Signup to blockchain as manufacturer or distributor or consumer or retailer. ● login to blockchain . ● scan the QR along with location. ● deduct ETH from wallet for each scanning update the details in blockchain. ● Verify the received product By scanning the QR code. ● if image is QR code and generated by blockchain than product details are shown. ● Logout of the transactions.
  • 10. Software Testing The testing steps are: ● Unit Testing. ● Integration Testing. ● Validation Testing. ● User Acceptance Testing.
  • 11. Unit Testing ● Unit testing, also known as component testing. ● It refers to tests that verify the functionality of a specific section of code, usually at the function level. ● In an object-oriented environment, this is usually at the class level. ● Minimal unit tests include the constructors and destructors.
  • 12. Integration Testing ● Integration testing is any type of software testing that seeks to verify the interfaces between components against a software design. ● Integration testing works to expose defects in the interfaces and interaction between integrated components (modules).
  • 13. Validation Testing ● Validation testing can be defined in many ways; here the testing validates the software function in a manner that is reasonably expected by the customer. ● It may also be referred to as software quality control.
  • 14. User Acceptance Testing ● Performance of an acceptance test is actually the user’s show. ● All the above testing strategies were done using the following test case designs: ➢ Manufacturer ➢ Distributer ➢ Retailer ➢ Consumer ➢ Login
  • 15. Snapshots ● This section highlights the result of the project & the snapshots for each of the activities are shown along with the discussion of each activity describing its working. ● Every snapshots describes every single step of the “Fake Product Identification Using BlockChain”.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Future Work ● Future works could be to simplify the code. ● Customers will not be aware of Blockchain based E-Commerce websites or platform. ● so to make customers buy the product from this website. ● They need to know how this website is different from other shopping platform and website and the advantages this platform has.
  • 22. Learning from the Project ● Web App Development. ● Familiarity with Integrated Development Environment (IDE). ● Solidity Basic. ● Use of Bootstrap and other front end Technology for Layout. ● Web App running and deployment. ● Different Technique of debugging web application.
  • 23. Conclusion ● Using Blockchain technology to stop counterfeiting of the product could benefit the e-commerce companies as well as the customers. ● The manufacturer, distributor and customer will have the information of the product all the way from the time it gets manufactured to the time it reaches the customer. ● And it is almost impossible for a third party or a hacker to change the information of the product between any of the links in blockchain.