The article addresses the problem of counterfeit goods using Blockchain technology. An analysis of existing methods and tools for combating counterfeiting has been conducted, justifying the choice of blockchain as an effective means of ensuring transparency and data protection. An analysis of existing anti-counterfeiting approaches has been conducted, justifying the choice of blockchain as an effective method for ensuring transparency and data protection. The authors designed the system using a structured approach, which allowed for task systematization and the identification of key operational aspects. For system modeling, the Data Flow Diagrams (DFD) methodology was applied, enabling the creation of a context diagram and decomposition diagrams. The system architecture was developed based on Hyperledger Fabric, incorporating multiple nodes and certification authorities to ensure reliability and verification integrity. The functional purpose of the system is presented, allowing users to verify product authenticity. System verification was conducted, demonstrating its effectiveness and providing a description of the key operational stages.
- Beaver, N.A., Solomon, G.B., Wang, E., & Wegrzyn, K.E. (2021). Get Real: Preventing Counterfeit Product with Blockchain. Retrieved from: https://www.foley.com/insights/publications/2021/10/preventing-counterfeit- product-with-blockchain/
- David, M. (2024). The Yiwu market in China: where tradition meets innovation in global trade expansion. Daxue Consulting – Market Research and Consulting China. Retrieved from: https://daxueconsulting.com/yiwu-market- in-china/
- Dawson, R., & Baxter, M. (2019). Announcing Hyperledger Besu. Retrieved from: https://www.lfdecentra- lizedtrust.org/blog/2019/08/29/announcing-hyperledger-besu
- Dhor, P.S. (2022). The Mathematics behind Blockchain. Retrieved from: https://blockchain.ieee. org/images/files/pdf/techbriefs-2022-q3/the-mathematics-behind-blockchain.pdf
- Gadgilwar, C. (2019). Role of Peers in Hyperledger Fabric Blockchain. Retrieved from: https://medium. com/@chetan.gadgilwar/role-of-peers-in-hyperledger-fabric-blockchain-fe383d8ee84c
- Gao, X., Zhang, W., Zhao, B., Zhang, J., Wang, J., & Gao, Y. (2022). Product Authentication Technology Integrating Blockchain and Traceability Structure. Retrieved from: https://www.researchgate.net/publication/364405489_ Product_Authentication_Technology_Integrating_Blockchain_and_Traceability_Structure
- Gęsior, T. (2020). P2P in Hyperledger Fabric. Retrieved from: https://brightinventions.pl/blog/p2p-in-hyperledger- fabric/
- Gudadhe, M., Alchewar, S., Shelke, R., Mohariya, K. , Moon, S., & Dhote, P. (2023). Unveiling Fakes: A Blockchain-Backed Approach for Product Authentication. Retrieved from: https://www.ijraset.com/research- paper/blockchain-backed-approach-for-product-authentication
- Harbert, T. (2019). Blockchain for business starts in the supply chain. Retrieved from: https://mitsloan. mit.edu/ideas-made-to-matter/blockchain-business-starts-supply-chain
- Helmy, B.E., & Aibin, M. (2024). An Introduction to Peer-to-Peer Network Model. Retrieved from: https://www.baeldung.com/cs/peer-to-peer-network-model
- Henry, W., Kathawate, R., Chen, E., & Coulter, J. (2023). Using blockchain to drive supply chain transparency. Retrieved from: https://www2.deloitte.com/us/en/pages/operations/articles/blockchain-sup...
- Howard, H. (2014). ARC: Analysis of Raft Consensus. Retrieved from: https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-857.pdf
- Kamble, D., Singh, A., Chaudhari, V., Koli, R., & Menon, S. (2023). Integrating QR Code and Blockchain Technologies for Enhanced Authenticity and Traceability of Products. Retrieved from: https://stmcomputers. stmjournals.com/index.php/JoADMS/article/view/486
- Li, L., Qu, H., Wang, H., Wang, J., Wang, B., Wangm, W., Xu, J., & Wang, Z. (2022). A Blockchain-Based Product Traceability System with Off-Chain EPCIS and IoT Device Authentication. Retrieved from: https://www.mdpi.com/1424-8220/22/22/8680
- Malchenko, S. (2021). Why Choose Corda For Your Project? Retrieved from: https://4irelabs.com/articles/why- choose-corda-for-your-project
- Merkle, R.C. (2020). A digital signature based on a conventional encryption function. In: Advances in Cryptology
- – CRYPTO 'S (Lecture Notes in Computer Science). Vol. 293. Conference paper. 2020. pp. 369–378
- OECD. (2019). Trade in fake goods is now 3.3 % of world trade and rising. OECD. Retrieved from: https://web- archive.oecd.org/2019-03-19/511489-trade-in-fake-goods-is-now-33-of-world-trade-and-rising.htm
- Richter, F. (2019). U.S. Companies Most Affected by Counterfeiting. Retrieved from: https://www.statista. com/chart/17407/countries-most-affected-by-counterfeit-and-pirated-goods/
- Spec In. (2024). IDEF0 Diagram. Retrieved from: https://help.specinnovations.com/idef0-diagram
- Vardhan, H.V., Rohan, L., Reddy, A.K., & Mourya, M. (2023). Mitigating Counterfeiting Using Blockchain Enabled Product Authentication. Retrieved from: https://www.ijraset.com/research-paper/mitigating-counter- feiting-using-blockchain-enabled-product-authentication
- Wang, Y., Han, J., & Beynon-Davies, P. (2018). Understanding blockchain technology for future supply chains: a systematic literature review and research agenda. Retrieved from: https://www.researchgate.net/publication/ 329813013_Understanding_blockchain_technology_for_future_supply_chains_a_systematic_literature_review_a nd_research_agenda
- Wasnik, K., Sondawle, I., Wani, R., & Pulgam, N. (2022). Detection of Counterfeit Products using Blockchain. Retrieved from: https://www.researchgate.net/publication/ 360414345_Detection_of_Counterfeit_Products_ using_Blockchain