Inspiration

We are inspired the working of the blockchain technology because of their of reliability and wide range of application in complex fields like cryptocurrency,handling a vast huge amount data handling.A a wide range of useful application for the general public in the field of maintaining very highly secured information like railway reservation system and other valuable information.

What it does

Fake product identification checks whether the product is genuine product or not by implementing a QR code in which the details about the particular product is uploaded to database in blockchain.While in the time booking the product in e-commerce sites.In the processing of scanning of the particular product if the details were uploaded or updated it shows the product as received product to the customer . If the details of the product scanned does not meet the accurate details used in registered. The product will be declared as a fake product.And it will be rejected for delivery to the customer.

How we built it

We built the database by taking a dummy database by The SHA-256 algorithm is one flavor of SHA-2 (Secure Hash Algorithm 2), which was created by the National Security Agency in 2001 as a successor to SHA-1. SHA-256 is a patented cryptographic hash function that outputs a value that is 256 bits long. 1] Sha-256 algorithm is used in blockchain to get a constant hash of 256 bits every time. This algorithm, is also part of encryption technology. So, now let’s see how this algorithm works: 2] In the figure you can see the prototype of algorithm. In this there is some data called IV which is of 256 bits. Now the input we get will be in the very large. So, be break it in size of 512 bits. 3] As the input will always be not a perfect multiple of 512 bits, So, some part of input will be left. 4] To this left input we do a padding concatenate the input with 10 bits before it. Now our input is perfect multiple, so we can proceed further.
5] Now 512-bit input is added with 256 bits IV to get total of 768 bit. These 768 bits is passed through compression function ‘c’ to get an output of 256 bit only. 6] This output 256 bit is again merged with 512 bits input from block B2. 7] Again, the total is passed through the compression function to yield a 256-bit output. This loop goes on fill the last block (block n). 8] Again, a compressing function starts and gives final 256-bits output, what we call it as hash of input data.

Challenges we ran into

We run into many problems particularly in storing data in events of blocks in the circuit of the blockchain that to be identify by the input information while in the scanning of the most relevant or the most matched data found in the event of the block .

Accomplishments that we're proud of

We are proud of implementing a vast huge amount of data in the QR code form and accessing from the millions of data.

What we learned

We learnt what is blockchain in detail and what is the use of blockchain in detail and how to implement it using languages and packages like python,java script,etc.

What's next for Fake product identification

We want to implement it as a standard measure that to be accept it by the general public and we want to implement in every product of several categories ranging from vegetables to plastic pipes etc as a standard measure that to be taken by every genuine product making companies.So we want to implement a very quality high rich nature resources for block data and identifying a better or lightest and
fastest algorithm for implementation of the blockchain development.

Built With

Share this project:

Updates