Disaggregation events and decommissioning events

ABSTRACT

Systems and methods are directed to supply chain management. In particular, the tracking, tracing, authenticating, and reporting of supply chain events for products, is disclosed. Various embodiments can store, analyze, and track supply chain events and help to coordinate and maintain trading partner connections. Various embodiments also help to enhance patient safety, secure the supply chains for pharmaceuticals, medical devices, and other healthcare products, and help users to follow regulatory requirements.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of, claims priority to and thebenefit of, U.S. Ser. No. 16/778,348, filed Jan. 31, 2020 and entitledSUPPLY CHAIN EVENT MANAGEMENT. The '348 application is a continuationof, claims priority to and the benefit of U.S. Ser. No. 15/461,294 filedMar. 16, 2017 and entitled SUPPLY CHAIN EVENT MANAGEMENT. The '294application is a continuation of, claims priority to and the benefit ofU.S. Ser. No. 13/804,955 filed Mar. 14, 2013 and entitled SYSTEMS ANDMETHODS FOR SUPPLY CHAIN MANAGEMENT, and issued as U.S. Pat. No.9,633,325 on Apr. 25, 2017. The '955 is a continuation of, claimspriority to and the benefit of, U.S. Ser. No. 13/804,572 filed on Mar.14, 2013 entitled SYSTEMS AND METHODS FOR SUPPLY CHAIN MANAGEMENT, andissued as U.S. Pat. No. 9,589,247 on Mar. 7, 2017. The '572 applicationclaims priority to, and is a non-provisional of, U.S. Provisional No.61/725,350 filed on Nov. 12, 2012. All of the aforementionedapplications are incorporated herein by reference in their entirety.

FIELD

Various embodiments are directed to systems and methods for supply chainmanagement, and more particularly, to tracking, tracing, authenticating,and reporting supply chain events for healthcare products.

BACKGROUND

Securing the supply chain is one of the most important challengesconfronting manufacturers and other entities involved in supplyingproducts to the healthcare industry. State and federal legislationrequire the implementation of pedigree and tracking systems with thegoal of enhancing patient safety by helping to secure the supply chain.

The high number of products in a supply chain makes it difficult totrack individual products or groups of products (e.g. a “case”). Inaddition, the number of different parties (e.g., manufacturer,distributor, pharmacy and hospital) adds to the complexity of trackingproducts.

Additionally, due to the high volume of products in a supply chain,counterfeit goods are often prevalent. Counterfeiters typically generateduplicate packaging and submit the fake product into a distributor'swarehouse. This will result in the distributor unknowingly shipping realand counterfeit items. Various embodiments of the present disclosurehelp resolve such issues in an efficient manner.

BRIEF DESCRIPTION OF THE DRAWINGS

A more complete understanding of the various embodiments may be derivedby referring to the detailed description and claims when considered inconnection with the following illustrative figures:

FIG. 1 illustrates an exemplary system, according to variousembodiments.

FIG. 2 illustrates exemplary partners in an exemplary supply chain,according to various embodiments.

FIGS. 3-7 illustrate exemplary partners generating and publishingevents, according to various embodiments.

FIGS. 8-10 are flow diagrams illustrating exemplary processes, accordingto various embodiments.

FIGS. 11-21 illustrate exemplary screenshots, according to variousembodiments.

DETAILED DESCRIPTION

Exemplary System

An exemplary system 100 is depicted in FIG. 1 . In various embodiments,the system 100 includes a computer system 110 comprising a processor 112and a memory 114. Computer system 110 is in communication with a userinterface 120, which includes an input device 122, and output device124. Computer system 110 is further in communication with multipleexternal devices 130, as well as a database 140. System 100 may beimplemented in a facility for tracking and tracing products, and may beone of a plurality of such systems operating together, or separately, tolocate products, and/or provide information on the products to theappropriate parties. Such stations may share any of the devices orresources shown in FIG. 1 .

In various embodiments, and as shown in FIG. 1 , computer system 110 maystore a software program configured to perform the methods describedherein in the memory 114, and run the software program using theprocessor 112. The computer system 110 may include any number ofindividual processors 112 and memories 114. Various data may becommunicated between the computer system 110 and a user via the userinterface 120. Such information may also be communicated between thecomputer system 110 and the external devices 130, database 140, and/orany other computing device connected to the computer system 110 (e.g.,through any network such as a local area network (LAN), or wide areanetwork (WAN) such as the Internet).

In exemplary system 100 depicted in FIG. 1 , the processor 112 retrievesand executes instructions stored in the memory 114 to control theoperation of the computer system 110. Any number and type ofprocessor(s) (e.g., an integrated circuit microprocessor,microcontroller, and/or digital signal processor (DSP)), can be used inconjunction with the various embodiments. The processor 112 may include,and/or operate in conjunction with, any other suitable components andfeatures, such as comparators, analog-to-digital converters (ADCs),and/or digital-to-analog converters (DACs). Functionality of variousembodiments may also be implemented through various hardware componentsstoring machine-readable instructions, such as application-specificintegrated circuits (ASICs), field-programmable gate arrays (FPGAs)and/or complex programmable logic devices (CPLDs).

The memory 114 may include a non-transitory computer-readable medium(such as on a CD-ROM, DVD-ROM, hard drive or FLASH memory) storingcomputer-readable instructions stored thereon that can be executed bythe processor 112 to perform the methods of the present disclosure. Thememory 114 may include any combination of different memory storagedevices, such as hard drives, random access memory (RAM), read onlymemory (ROM), FLASH memory, or any other type of volatile and/ornonvolatile memory.

The computer system 110 may receive and display information (such asinformation related to specific products) via the user interface 120.The user interface 120 (and the user interfaces of any external devices130 used in conjunction with various embodiments) may include variousperipheral output devices 124 (such as monitors and printers), as wellas any suitable input or control devices 122 (such as a mouse andkeyboard) to allow users to control and interact with the softwareprogram.

The user interface 120 may include any number of components, devices,and/or systems (e.g., speakers, an external memory device, a touch pad,a touch screen, and/or an alphanumeric keypad) to allow a user to enterinstructions, data related to products (e.g., problem products), andother input. The user interface 120 may also include a microphone toallow a user to provide audio input, as well as a camera to allow theuser to capture still or video images of a product being analyzed. Anyof the components of the user interface 120 may be utilized as externaldevices 130 as described below.

The user interface of any component operating in conjunction withvarious embodiments may include, or operate with, audio or speechrecognition software to process and analyze audio or verbal inputthrough the user interface, as well as pattern recognition software toanalyze graphics, text, and video received through the user interface120, from the external devices 130, or from any other source.

The computer system 110 may communicate with any number of devices 130.In various embodiments, one or more devices 130 are configured to obtaininformation regarding a particular product and provide the informationto the computer system 110 through a wired or wireless connection.Devices 130 may also communicate directly with the database 140, eachother, or with any other system or device operating in conjunction withthe embodiments described herein.

Various embodiments can track and trace items in a supply chain via anelectronic product code (EPC). The EPC can be any code, symbol, pictureand/or any other unique identifier assigned to each item or subset ofitems in the chain. EPCs and other information regarding a product maybe stored in a barcode, QR code, radio frequency identification (RFID)tag or any other method or system for identifying an item. The EPC maybe attached to the product's packaging, and/or associated with a productin any other desired manner. Accordingly, various embodiments mayoperate in conjunction with a device 130 that includes a handheldscanner (e.g., a barcode scanner and/or RFID reader) for reading suchinformation and communicating it to the computer system 110, database140, or other system. Such scanners may communicate with the computersystem 110 or other device through a wired connection, such as auniversal serial bus (USB) connection, a computer network connection, amobile device synchronization port connection, a power connection, asecurity cable and/or any other means set forth herein or known in theart. Such scanners may also communicate with any device operating inconjunction with the system through any desired wireless connection ornetwork, such as a wireless Internet connection, a cellular telephonenetwork connection, a wireless LAN connection, a wireless WANconnection, and/or an optical connection. Various embodiments mayinclude, or operate in conjunction with, any other type of scanner orsimilar device.

The database 140 stores and provides information related to products, aswell as any other desired information (as further discussed herein). Thedatabase 140 may be implemented on computer system 110 or hosted byanother system or device (such as a server) in communication with thecomputer system 100 via, for example, a network such as a LAN or WAN. Invarious embodiments, database 140 may be implemented as a relationaldatabase.

The computer system 110 may include, or operate in conjunction with, anytype of computing device, such as a laptop computer, a desktop computer,a mobile subscriber communication device, a mobile phone, a personaldigital assistant (PDA), a tablet computer, a digital camera, a videocamera, a video game console, and/or a media player.

As set forth herein, the computer system 110 and other computing devicesoperating in conjunction with various embodiments may include anoperating system (e.g., Windows, OS2, UNIX, Linux, Solaris, MacOS, etc.)as well as various conventional support software and drivers typicallyassociated with computers. Software applications stored in the memory ofsuch devices may be entirely or partially served or executed by theprocessor(s) in performing methods or processes of the presentdisclosure.

Any of the components in FIG. 1 , as well as other systems andcomponents operating with, or as part of, various embodiments maycommunicate with each other via a network (not shown). In variousembodiments, one or more components of system 100 may include a wirelesstransceiver and the network may comprise a wireless system to allowwireless communication between various systems and devices, such as awireless mobile telephony network, General Packet Radio Service (GPRS)network, wireless Local Area Network (WLAN), Global System for MobileCommunications (GSM) network, Personal Communication Service (PCS)network, Advanced Mobile Phone System (AMPS) network, and/or a satellitecommunication network. Such networks may be configured to facilitatecommunication via any other type of connection, such as a wired Internetconnection, a wireless Internet connection, a cellular telephone networkconnection, a wireless LAN connection, a wireless WAN connection, anoptical connection, a USB connection, and/or a mobile devicesynchronization port connection.

Event Sequence Introduction

Various embodiments provide a comprehensive solution to capture,correlate and/or assess supply chain events, and to track and trace suchevents across any portion of the supply chain and/or the entire supplychain. The disclosure includes forward and/or reverse logistics withappropriate data visibility governance. Various embodiments also providepedigree and/or chain of custody support for prevention and/or earlydetection of fraud or other anomalies in the supply chain. Variousembodiments also provide alerting and/or notification of abnormalitiesand/or suspicious events. Various embodiments provide metrics and/oranalytics for insights and improvements to the systems and methods. Theembodiments disclosed herein can also be configured to provide efficientand effective support for supply chain members, while remaining adaptiveto changing regulatory and legal requirements.

As described in more detail herein, various embodiments of thedisclosure may create, store, process, and/or retrieve sets of eventsassociated with one or more EPCs. Various embodiments can help detectand/or prevent acts of fraud, missing items in a supply chain, missingevents associated with such items, duplicate packaging of items, and/orother issues that are difficult or impossible for conventional supplymanagement systems to identify.

In various embodiments, sets of events for one or more EPCs may betime-ordered in a sequence, also referred to herein as an “eventsequence.” An EPC used in conjunction with various embodiments may be inany desired format. For example, the EPC for an item may include aglobal trade item number (GTIN) and/or national drug code (NDC) thathelps describe the item. EPCs may include any combination ofalphanumeric characters, symbols, graphics, or other identifiers. Invarious embodiments, an EPC may include a header, filter value,partition value, EPC manager number (e.g., UPC company prefix), GTINitem reference number, and/or a serial number. An EPCIS event mayinclude any desired information, such as the EPC, name, manufacturer,dosage form, strength, container size, lot number, name of tradingpartners, shipping addresses, a global location number (GLN), licenses,and/or other information associated with a product.

An EPC may be assigned to one or more products at the “unit of sale”level, also known as a “sellable unit” or the “lowest unit of sale.” Asused herein, the “unit of sale” level is the smallest individual unit ofproduct that can be offered for sale to a pharmacy, such as a bottle ofpills, or a package containing multiple vials. Various embodiments cantrack products at any level of aggregation (including products packagedinside multiple levels of nested containers) such as: bundles, trays,cases, totes, pallets, inner packs, wallets, and overpack boxes. Therelationship between sellable units and their various aggregations canbe stored in the external data repository. Storage of events may also bepersistent such that the chain of custody of an item or package can betraced even after an aggregated container is decommissioned.

Various embodiments can follow individual unit of sale-level products(or groups thereof) based on events associated with the products.Various embodiments may operate in conjunction with any type of eventassociated with a product in a supply chain. As discussed above, an EPCis a unique identifier corresponding to a specific tangible item in asupply chain, and events may include any state (or change therein)associated with the item. Various embodiments may be used to receive,store, and analyze data regarding items shipped in any manner, includinghomogeneous shipments, mixed-case shipments, partial cases, shipmentswith or without pallets, drop shipments, and shipments in totes.

Different entities of the supply chain may participate and utilizevarious embodiments of the disclosure. These entities include, but arenot limited to, manufacturers, third party manufacturers, wholesalers,repackaging facilities, third party logistic providers, reversedistributors, retailers, pharmacies, and provider (e.g. hospital)pharmacies.

For example, a manufacturer trading partner in a supply chain maygenerate and/or publish “commissioning” events as an initiating eventfor a sellable item. The commissioning event is used to identifysellable items, as well as their containers (e.g., cases, pallets, andtotes) or aggregation hierarchies (lots) to the system. Whilemanufacturers may normally initiate commissioning events, other membersof the supply chain may generate commissioning events, as well as anyother suitable type of event. For example, wholesalers may publishcommissioning events when they repackage units and/or create kits.

Commissioning events can be published to the external data repository,with each event containing an identifier (such as a serial number) forthe commissioned item or container. The commissioning event may includeany other desired information, including an event date/time (timestamp),a record time (the time the event was written to the participant's datasystem), an EPC List (names the physical object(s) to which the eventpertains, for example, a container), a read point (GLN), a businesslocation (GLN), a lot/batch number, a lot/batch expiration date, a GTIN,drug product information, a Manufacturer Name or Information ProviderName, a Manufacturer or Information Provider GLN, and contactinformation for a Manufacturer or Information Provider.

In various embodiments, commissioning of items is a separate event fromthe commissioning of containers, and there should be only onecommissioning event for an item from a manufacturer, either at the ThirdParty Manufacturer or at the NDA brand owner's manufacturing site.Normally, a commissioning event is expected prior to a shipment event.In addition, duplicate commissioning events may be indicative of fraudor duplicate products in the supply chain. Trading partners downstreamfrom the manufacturer or issuer of the commissioning event may look forcommissioning events prior to shipment events for the same item.

Rules from a rules engine may be enforced on commissioning events (aswith other events). For example, various embodiments may include that,in response to the item having a commissioning event associated to it(if not previously decommissioned), a new commissioning event is notallowed. For example, various embodiments may include that, in responseto the item having a commissioning event associated to it (if notpreviously decommissioned), new commissioning events are accepted butreported as suspect. Various embodiments may also issue a warning on ashipping event for an item that was never commissioned.

However, systems and methods of the disclosure may also be configured tobe flexible enough to allow commissioning to occur at varying steps ofthe process. For example, a product may be commissioned on theproduction line, as a shipment is being packed, and/or by a wholesaler(e.g., commissioning a container).

A “decommissioning” event may be issued in response to a number ofscenarios, such as the destruction of unconsumed, expired, and/ordamaged product; recalled products at the point of destruction; aproduct being dispensed or consumed; and/or a container being discarded.A decommissioning event can occur at any point in the event chain.

In various embodiments, even after a container is “decommissioned,” thedata repository may still maintain the commissioning and aggregationdata for the container, so that at a future date it is possible todetermine what container originally held (and was associated to) aspecific sellable item. The data repository in various embodiments mayaccept such decommissioning and disaggregation events if published, andcan auto-generate decommissions if desired.

Various embodiments may utilize “aggregation events” that describerelationships between items having EPCs. For example, an aggregationevent may include adding six bottles of aspirin (each with its own EPC)into a shipping container (also with its own EPC). Various embodimentsmay register the aggregation event and track the six bottlesindividually or via the shipping container in which they reside.

Aggregation event data that documents chain of custody may be madeavailable to all downstream participants with appropriate data rights.Various embodiments may allow multiple aggregation events for onesellable item within the supply chain, such as where a manufactureraggregates an item to a case, then a wholesaler disaggregates the itemfrom the case, and re-aggregates the item to a tote. Aggregatedcontainer serial numbers may also re-used for reusable containers (suchas totes) to accommodate situations where some reusable containers'serial numbers never change, while others do.

Various embodiments can track products at various possible levels ofaggregation including: individual items, bundle, tray, case, tote,pallet, inner pack, wallet, and overpack box. It will be appreciatedthat this is an exemplary list of various levels of aggregation, andother levels of aggregation are possible, including: shipping product inhomogenous cases or other level of container, shipping product in mixedcases or other level of container, shipping product in partial cases orother level of container, shipping product with or without pallets, andshipping product via drop shipment.

A “disaggregation event” may include removing some of the items (e.g.,bottles of aspirin) from a container. Other events may capture businessprocesses, such as shipping, receiving, dispensing, and/or holding ashipment for return. Various embodiments may operate in conjunction withany type of events, including those described in the GS1 ElectronicProduct Code Information Services (EPCIS) standard. Systems and methodsmay further receive decommissioning events from members of a supplychain. Various embodiments may also be configurable to automaticallygenerate decommissioning events on behalf of participants who choose touse this functionality.

FIG. 2 depicts different partners in an exemplary supply chain(manufacturers, wholesalers, pharmacies, etc.) that would utilizevarious embodiments of systems and methods of the present disclosure. Inthis example, Manufacturer A, Distributor B, and Pharmacy C each connectvia an external data repository. The external data repository mayinclude one or more servers and may communicate with databases andcomputer systems local to each trading partner, and may be referred toherein as the “external data repository server(s).”

The following includes examples of event handling associated with thedisclosed embodiments. As will be appreciated, examples disclosed hereinare only exemplary examples and are not intended to fully document allscenarios.

Event Handling

Handling Commissioning Events

In response to the system receiving a commissioning event from an entityin the supply chain, the commissioning event may be handled in thefollowing manner by various embodiments. For each EPC listed within thecommissioning event, the system determines whether the EPC is known. Ifthe EPC is not known, then the system records the EPC and stores the EPCinformation in the repository. The system then associates thecommissioning event with the EPC, whether or not the EPC was previouslyknown.

For each associated EPC, the system determines whether an event sequenceexists for the EPC. If an event sequence exists, the system may performa preliminary assessment of the event sequence relative to thiscommissioning event as follows. If an event sequence does not exist, thesystem initiates an EPC event sequence with the commissioning event asthe initial event for the EPC.

In accordance with various embodiments, for assessing an EPC eventsequence, when the current event is a commissioning event, the systemchecks to see if there are any events in the event sequence earlier thanthe current commissioning event. If there are earlier events in theevent sequence for the EPC, the system sets the EPC state to a potentialduplicate EPC condition, as the commissioning event should be the firstevent.

For each associated EPC, if the current EPC state indicates a missingcommissioning event for the event sequence, the system determineswhether the current commissioning event satisfies the missingcommissioning event. If the current commissioning event satisfies themissing commissioning event, the system clears the EPC state of themissing commissioning event. If the missing commissioning event statefor the EPC cannot be cleared by the current commissioning event, themissing commissioning event state is updated to reflect the presence ofa commissioning event that does not satisfy the previous missingcommissioning event state.

Handling Aggregation Events

In response to the system receiving an aggregation event from an entityin the supply chain, the aggregation event may be handled in thefollowing manner by various embodiments. For the parent EPC listedwithin the aggregation event, the system determines whether the parentEPC is known. If the parent EPC is not known, the system records theparent EPC and stores the parent EPC information in the repository. Thesystem then associates the aggregation event with the parent EPC,whether the parent EPC was previously known or not.

For each child EPC listed within the aggregation event, the systemdetermines whether the child EPC is known. If the child EPC is notknown, the system records the child EPC and stores the child EPCinformation in the repository. The system then associates theaggregation event with the child EPC, whether the child EPC waspreviously known or not.

For the parent EPC, the system determines whether an event sequenceexists for the parent EPC. If an event sequence exists, the system mayperform a preliminary assessment of the event sequence relative to thisaggregation event as follows. If an event sequence does not exist, thesystem initiates an EPC event sequence for the parent EPC.

In accordance with various embodiments, the preliminary assessment ofthe parent EPC event sequence may include:

If a decommissioning event exists earlier in the event sequence, thenthe system sets the parent EPC state to a condition reflecting error asthere should not be any events after a decommissioning event.

If the parent EPC container is not reusable, then the system shouldcheck for any disaggregation events earlier in the event sequence thanthe current aggregation event. If a disaggregation event exists for theparent EPC container, then the system sets the parent EPC state to acondition reflecting error as a non-reusable container as a parentshould not previously been involved in disaggregation.

If the parent EPC container is not reusable, then the system shouldcheck for any shipping or receiving events earlier in the event sequencethan the current aggregation event. If a shipping or receiving eventexists for the parent EPC container, then the system sets the parent EPCstate to a condition reflecting error, as a non-reusable containercannot not be shipped or received and then more products added.

If the parent EPC container is not reusable, then the system shouldcheck that there is only one commissioning event earlier in the eventsequence than the current event. If there is more than one commissioningevent, then the system sets the parent EPC state to a conditionreflecting error as there should only be one commissioning event.

If the parent EPC event sequence has events subsequent in time to thecurrent aggregation event, the system may associate each such subsequentevent for the parent EPC with each of the child EPCs listed in theaggregation event. These subsequent events might include ship,receiving, disaggregation and/or decommissioning events. The system willonly associate the ship, receiving and disaggregation events with thechild EPCs. These subsequent events, when associated with the childEPCs, are applied recursively through the parent/child containmenthierarchy.

For each child EPC listed in the aggregation event, the systemdetermines whether an event sequence exists for the child EPC. If anevent sequence exists, the system may perform a preliminary assessmentof the event sequence relative to this aggregation event, in accordancewith various embodiments, as follows. If an event sequence does notexist, the system initiates an EPC event sequence for the child EPC. Ifthe system begins the event sequence with the aggregation event, then ifthe child EPC is an item, the EPC state is set to indicate a missingcommissioning event as an item should have a commissioning event.

In accordance with various embodiments, the preliminary assessment ofthe child EPC event sequence may include:

If a decommissioning event exists earlier in the event sequence, thenthe system sets the child EPC state to a condition reflecting error asthere should not be any events after a decommissioning event.

If the child EPC is an individual item, then the system checks forexistence of only one commissioning event earlier in the event sequencethen the current event. If there is more than one commissioning event,the system sets the child EPC state to a condition reflecting error asthere should only be one commissioning event for an individual item.

If the child EPC is a container, whether or not the container isreusable, the system should check for any disaggregation events, inwhich the child EPC appears as a parent, that occur earlier in the eventsequence than the current aggregation event. If a disaggregation eventexists in which the child EPC appears as a parent, then the system setsthe child EPC state to a condition reflecting error as an open containercannot be aggregated into another container.

If the child EPC is a container, whether or not the container isreusable, the system should check for any aggregation events, in whichan EPC appears as a child, that occur earlier in the event sequence thanthe current aggregation event, and where the parent EPC of the earlieraggregation event is also the parent EPC of the current event. If suchan event exists, then the system sets the child EPC state to a conditionreflecting error as an item can only be added once to a container.

If the child EPC is a container, and the container is not reusable, thenthe system should check for an aggregation event earlier in the eventsequence in which the child EPC appears as the parent. If such an eventis not found, then the system sets the child EPC state to a conditionreflecting error as a non-reusable container should have its own parentaggregation event.

If the child EPC is a container, and the container is not reusable, thenthe system should check that there is only one commissioning eventearlier in the event sequence than the current event. If there is morethan one commissioning event, then the system sets the child EPC stateto a condition reflecting error as there should only be onecommissioning event.

For each child EPC, if an aggregation event exists earlier in the eventsequence where the child EPC is also a child of the earlier aggregationevent, then the system deduces a disaggregation event for the parent EPCand for each of the child EPCs of that earlier aggregation event.

Handling Disaggregation Events

When the system receives a disaggregation event from an entity in thesupply chain, the disaggregation event may be handled in the followingmanner by various embodiments. For the parent EPC listed within thedisaggregation event, the system determines whether the parent EPC isknown. If the parent EPC is not known, the system records the parent EPCand stores the parent EPC information in the repository. The system thenassociates the disaggregation event with the parent EPC, whether theparent EPC was previously known or not.

For each child EPC listed within the disaggregation event, the systemdetermines whether the child EPC is known. If the child EPC is notknown, the system records the child EPC and stores the child EPCinformation in the repository. The system then associates thedisaggregation event with the child EPC, whether the child EPC waspreviously known or not.

For the parent EPC, the system determines whether an event sequenceexists for the parent EPC. If an event sequence exists, the system mayperform a preliminary assessment of the event sequence relative to thisdisaggregation event as follows. If an event sequence does not exist,the system initiates an EPC event sequence for the parent EPC.

In accordance with various embodiments, the preliminary assessment ofthe parent EPC event sequence may include:

If a decommissioning event exists earlier in the event sequence, thenthe system sets the parent EPC state to a condition reflecting error asthere should not be any events after a decommissioning event.

For the parent EPC container (reusable or not), the system should checkfor the existence of at least one aggregation event earlier in the eventsequence than the current aggregation event, where the parent EPCappears as a parent for the earlier aggregation event. If such anaggregation event does not exist for the parent EPC container, then thesystem sets the parent EPC state to a condition reflecting error as anaggregation event should exist before the current disaggregation event.

If the parent EPC container is not reusable, then the system shouldcheck that there is only one commissioning event earlier in the eventsequence than the current event. If there is more than one commissioningevent, then the system sets the parent EPC state to a conditionreflecting error as there should only be one commissioning event.

For each child EPC listed in the disaggregation event, the systemdetermines whether an event sequence exists for the child EPC. If anevent sequence exists, the system may perform a preliminary assessmentof the event sequence relative to this disaggregation event, inaccordance with various embodiments, as follows. If an event sequencedoes not exist, the system initiates an EPC event sequence for the childEPC. If the system begins the event sequence with the currentdisaggregation event, then if the child EPC is an item, the EPC state isset to indicate a missing commissioning event as an item should have acommissioning event.

In accordance with various embodiments, the preliminary assessment ofthe child EPC event sequence may include:

If a decommissioning event exists earlier in the event sequence, thenthe system sets the child EPC state to a condition reflecting error asthere should not be any events after a decommissioning event.

For the child EPC (item or container), the system checks for theexistence of only one aggregation event earlier in the event sequencethen the current event, where the child EPC appears as a child in theearlier aggregation event. If there is zero or more than one suchearlier aggregation events where the child EPC appears as a child, thenthe system sets the child EPC state to a condition reflecting error as achild can participate in only parent/child relationship at a time.

If the child EPC is an individual item, then the system checks forexistence of only one commissioning event earlier in the event sequencethen the current event. If there is more than one commissioning event orno commissioning event, then the system sets the child EPC state to acondition reflecting error as there should be one (and only one)commissioning event for an individual item.

If the child EPC is a container, and the container is not reusable, thenthe system should check for an aggregation event earlier in the eventsequence in which the child EPC appears as the parent. If such an eventis not found, then the system sets the child EPC state to a conditionreflecting error as a non-reusable container should have its own parentaggregation event.

If the child EPC is a container, and the container is not reusable, thenthe system should check that there is only one commissioning eventearlier in the event sequence than the current event. If there is morethan one commissioning event, then the system sets the child EPC stateto a condition reflecting error as there should only be onecommissioning event.

Handling Decommissioning Events

When the system receives a decommissioning event from an entity in thesupply chain, the decommissioning event may be handled in the followingmanner by various embodiments. For each EPC listed within thedecommissioning event, the system determines whether the EPC is known.If the EPC is not known, then the system records the EPC and stores theEPC information in the repository. The system then associates thedecommissioning event with the EPC, whether or not the EPC waspreviously known.

For each associated EPC, the system determines whether an event sequenceexists for the EPC. If an event sequence exists, the system may performa preliminary assessment of the event sequence relative to thisdecommissioning event as follows. If an event sequence does not exist,the system initiates an EPC event sequence with the decommissioningevent as the initial event for the EPC. If the EPC is for an item andthe event sequence does not exist, then the system sets the EPC state tonote a missing commissioning event condition. If the EPC is for acontainer and the event sequence does not exist, then the system setsthe EPC state to note a missing aggregation event condition.

In accordance with various embodiments, for assessing an EPC eventsequence, when the current event is a decommissioning event, the systemchecks to see if there are any decommissioning events in the eventsequence earlier than the current decommissioning event. If there areearlier decommissioning events in the event sequence for the EPC, thenthe system sets the EPC state to a condition reflecting error as thereshould not be any events after a decommissioning event.

For each listed EPC that is for an individual item, the system checksfor the existence of only one commissioning event earlier in the eventsequence then the current event. If there is more than one commissioningevent or no commissioning event, then the system sets the EPC state to acondition reflecting error as there should be one (and only one)commissioning event for an individual item.

For each listed EPC that is for a container that is not reusable, thesystem checks for the existence of only one commissioning event earlierin the event sequence then the current event. If there is more than onecommissioning event or no commissioning event, then the system sets theEPC state to a condition reflecting error as there should be one (andonly one) commissioning event for the container.

Handling Shipping Events

When the system receives a shipping event from an entity in the supplychain, the shipping event may be handled in the following manner byvarious embodiments. For each EPC listed within the shipping event, thesystem determines whether the EPC is known. If the EPC is not known, thesystem records the EPC and stores the EPC information in the repository.The system then associates the shipping event with the EPC, whether theEPC was previously known or not. In addition, the system will determineadditional EPCs from any parent/child containment relationships in arecursive matter, and associate the shipping event with those additionalEPCs as well.

For each EPC associated with the shipping event, the system determineswhether an event sequence exists for the EPC. If an event sequenceexists, the system may perform a preliminary assessment of the eventsequence relative to this shipping event as follows. If an eventsequence does not exist, the system initiates an event sequence for theEPC with the shipping event as the initial event for the EPC. If the EPCis for an item and the event sequence does not exist, then the systemsets the EPC state to note a missing commissioning event condition. Ifthe EPC is for a container and the event sequence does not exist, thenthe system sets the EPC state to note a missing aggregation eventcondition.

In accordance with various embodiments, the preliminary assessment ofeach EPC event sequence may include:

If a decommissioning event exists earlier in the event sequence, thenthe system sets the EPC state to a condition reflecting error as thereshould not be any events after a decommissioning event.

If the EPC is for an individual item, then the system checks forexistence of only one commissioning event earlier in the event sequencethen the current event. If there is more than one commissioning event orno commissioning event, then the system sets the EPC state to acondition reflecting error as there should be one (and only one)commissioning event for an individual item.

If the EPC is for a container that is not reusable, then the systemshould check that there is only one commissioning event earlier in theevent sequence than the current event. If there is more than onecommissioning event, then the system sets the EPC state to a conditionreflecting error as there should only be one commissioning event.

If the EPC is for a container that is not reusable, then the systemshould check for any disaggregation events earlier in the event sequencethan the current aggregation event. If a disaggregation event exists andthe EPC appears as parent in the earlier disaggregation event, then thesystem sets the EPC state to a condition reflecting error as an opencontainer cannot be shipped.

If the EPC is for a container that is not reusable, then the systemshould check for the existence of at least one aggregation event wherethe EPC appears as parent that occurs earlier in the event sequence thanthe current aggregation event. If such an aggregation event does notexist, then the system sets the EPC state to a condition reflectingerror as non-reusable containers should be parents before being shipped.

If the EPC is for a container and is reusable (e.g., tote), then thesystem should check that there is at least one aggregation event inwhich the EPC appears as parent earlier in the event sequence than thecurrent event, but later than any receiving event, or there should existat least one disaggregation event in which the EPC appears as parentearlier in the event sequence than the current event, but later than anyreceiving event. If neither such aggregation or disaggregation eventexists, then the system sets the EPC state to a condition reflectingerror as a reusable container is either a parent or is returning empty.

Handling Receiving Events

When the system receives a receiving event from an entity in the supplychain, the receiving event may be handled in the following manner byvarious embodiments. For each EPC listed within the receiving event, thesystem determines whether the EPC is known. If the EPC is not known, thesystem records the EPC and stores the EPC information in the repository.The system then associates the receiving event with the EPC, whether theEPC was previously known or not. In addition, the system will determineadditional EPCs from any parent/child containment relationships in arecursive matter, and associate the receiving event with thoseadditional EPCs as well.

For each EPC associated with the receiving event, the system determineswhether an event sequence exists for the EPC. If an event sequenceexists, the system may perform a preliminary assessment of the eventsequence relative to this receiving event as follows. If an eventsequence does not exist, the system initiates an event sequence for theEPC with the receiving event as the initial event for the EPC. If theEPC is for an item and the event sequence does not exist, then thesystem sets the EPC state to note a missing commissioning eventcondition. If the EPC is for a container and the event sequence does notexist, then the system sets the EPC state to note a missing aggregationevent condition.

In accordance with various embodiments, the preliminary assessment ofeach EPC event sequence may include:

If a decommissioning event exists earlier in the event sequence, thenthe system sets the EPC state to a condition reflecting error as thereshould not be any events after a decommissioning event.

The system should check for the existence of a matching shipping eventearlier in the event sequence than the current receiving event. If thereis no matching shipping event, then the system sets the EPC state to acondition reflecting the error.

If the EPC is for an individual item, then the system checks forexistence of only one commissioning event earlier in the event sequencethen the current event. If there is more than one commissioning event orno commissioning event, then the system sets the EPC state to acondition reflecting error as there should be one (and only one)commissioning event for an individual item.

If the EPC is for a container that is not reusable, then the systemshould check that there is only one commissioning event earlier in theevent sequence than the current event. If there is more than onecommissioning event, then the system sets the EPC state to a conditionreflecting error as there should only be one commissioning event.

If the EPC is for a container that is not reusable, then the systemshould check for any disaggregation events earlier in the event sequencethan the current aggregation event. If a disaggregation event exists andthe EPC appears as parent in the earlier disaggregation event, then thesystem sets the EPC state to a condition reflecting error as apreviously open container cannot be received.

If the EPC is for a container that is not reusable, then the systemshould check for the existence of at least one aggregation event wherethe EPC appears as parent that occurs earlier in the event sequence thanthe current aggregation event. If such an aggregation event does notexist, then the system sets the EPC state to a condition reflectingerror as non-reusable containers should be parents.

If the EPC is for a container and is reusable (e.g., tote), then thesystem should check that there is at least one aggregation event inwhich the EPC appears as parent earlier in the event sequence than thecurrent event, but later than any receiving event, or there should existat least one disaggregation event in which the EPC appears as parentearlier in the event sequence than the current event, but later than anyreceiving event. If neither such aggregation or disaggregation eventexists, then the system sets the EPC state to a condition reflectingerror as a reusable container is either a parent or is returning empty.

With reference to FIGS. 3-7 , in the example shown, three partners (A,B, and C) are shown interacting. Trading Partner A (310) is amanufacturer who produces items for sale and publishes “commissioning”events 312, 313 to the external data repository server. In addition,Trading Partner A publishes “aggregation” events 314 describing theadding of units of sale into cases and “shipping” events 316 as PartnerA ships its products to Trading Partner B (320), a distributor. TradingPartner A may maintain its own database which may contain events andother information internal to its operation and not published to theexternal data server.

Distributor 320 receives items produced by manufacturer 310 andretrieves events associated with the EPCs in the cases it received, aswell as publishing “receiving” events 322 in response to receivingitems. In addition, distributor 320 publishes shipping events 326, 328to the external data repository server in response to reshipping thecases to Trading Partner C (330), a provider (e.g., a pharmacy).Distributor B (320) publishes disaggregation events 324 in response toremoving units of sale from cases and shipping the units of sale toprovider 330. Provider 330 receives items produced by manufacturer 310and publishes “receiving” events 332, 334 in response to it receivingitems.

By logging and analyzing such events, various embodiments can quickly,accurately, and efficiently locate items in a supply chain. The systemmay also dynamically include or exclude inferred events in the eventsequence associated with an EPC by traversing published (known) eventsfor the EPC. For example, as shown in FIG. 4 , shipping event 316 andreceiving event 322 may be inferred by traversing the published events.Events relating to containers containing an individual item (at anylevel of nesting within other containers) may include events associatedwith the item until a disaggregation event involving the contained itemoccurs, at which point the events associated with the removed item canbe removed from the container's event list.

Exemplary Process

The methods described below may be implemented in any manner, such asthrough a software program operating on a computer-based system. Such asoftware program may be stored on any computer-readable medium, such asfloppy disks, hard disks, CD-ROMs, DVDs, any type of optical ormagneto-optical disks, volatile or non-volatile memory, and/or any othertype of media suitable for storing electronic instructions and capableof interfacing with a computing device. Methods according to embodimentsof present disclosure may operate in conjunction with any type ofcomputer system, such as a personal computer (PC), server, cellularphone, personal digital assistant (PDA), portable computer (such as alaptop), embedded computing system, and/or any other type of computingdevice. The computer system may include any number of computing devicesconnected in any manner, such as through a distributed network. Thecomputer system may communicate and/or interface with any number ofusers and/or other computing devices to send and receive any suitableinformation in any manner, such as via a local area network (LAN),cellular communication, radio, satellite transmission, a modem, theInternet, and/or the like.

FIG. 8 depicts an exemplary process 800 that may be utilized by variousembodiments to generate an event sequence for a target item having anEPC:

1. For a target EPC, identify events directly associated with the EPC(810).

2. From those events, find containers that held the EPC usinginformation from, for example, aggregation events to identify theparent-child relationships between the target item and the container(s)(820).

3. Repeat steps 1 & 2 on the container EPCs until no more events arefound (830).

4. From this full set of events for all related EPCs, filter only thoseevents that actually apply to the target EPC (840). So shipping andreceiving events for a container may be classified as “in effect”between the aggregation and disaggregation events.

5. Generate a list of events (optionally sorted in time order), whichcaptures everything that happened to the item identified by the targetEPC (850).

The algorithm above (and variants thereof) can function despite eventsthat are missing, duplicate events, or events that arrive out-of-order.Various embodiments may be configured to accept a set of target EPCsrather than just a single EPC and process them in batches to minimizedatabase reads, thereby improving the efficiency of the process.

Various embodiments may be configured to handle any number of eventsarriving in any order and from multiple actors in a supply chain. Forexample, where a series of events associated with an EPC are published,but the events do not include an aggregation event, the event sequencecan be automatically updated and properly reconciled in response to aparty publishing the aggregation event.

The event sequence for an EPC may be constructed and assessed under avariety of different scenarios. Two such scenarios include a read (wherea user or system requests some type of report) and a write (where abackground process evaluates EPCs). The read may be provided on demand,while the write may be driven by the arrival of new events. Variousembodiments may utilize a rules engine to apply the same rule set inboth scenarios. In such cases, a user receives the latest information inresponse to requesting a report, and the background process allowsalerts to be generated automatically. These results can also be cachedto help improve efficiency.

Various embodiments are particularly effective in detecting counterfeitgoods in a supply chain and preventing their distribution. For example,a counterfeiter could generate duplicate packaging and provide the fakeproduct into a distributor's warehouse. The distributor may unknowinglyship both items (the real item and the counterfeit) to differentdestinations, generating valid EPCIS events for the shipments.Embodiments of this disclosure may receive both events, determine thattwo different event sequence chains exist for the same product, andgenerate an alert to the appropriate entities to, for example, haltfurther distribution of the shipments and/or to review the shipments todetermine the source of the duplicate sequences.

While many conventional supply chain management systems enforce rigidconstraints during the input process and reject events that might causeinconsistencies, various embodiments can provide a significantly moreflexible solution to supply chain management by accepting events withoutsuch constraints and performing analyses to identify inconsistentevents. In this manner, various embodiments may be better able to detectinstances of broken inference, fraudulent packaging, and suspiciousbehavior compared to conventional systems.

Use of Rules Engine to Assess Event Sequence

In various embodiments, a rules engine is invoked on the events of anevent sequence to assess the collection of the contained events. Forexample, various embodiments can determine whether there are missingevents that “break the chain” of events tracing EPCs in the supplychain. Additionally, various embodiments can detect suspicious eventsthat may indicate fraudulent handing or publishing of events.

Various embodiments may utilize a rules engine to add structure to theevent set and perform conditional tests on that structure. Variousembodiments may operate in conjunction with any desired rules in anyformat. For example, the following exemplary rules are defined in theDrools language for execution in that run-time rule engine, withsoftware supplying the event structure and content. Various embodimentsof the disclosure can also include helper functions or callbacks to theDrools rule engine. Various embodiments may utilize some, all, ordifferent rules than those listed below. Rules may be stored in adatabase, text file, or any other suitable source for retrieval by therules engine.

General Rules to Evaluate Known Conditions

No Commissioning Event—If an EPC does not have a commissioning event,then mark it as “inconsistent” and return an error.

Too Many Commissioning Events—If an EPC has more than one commissioningevent, then mark it as “suspect” and return an error.

Receiving Event Without Shipping Event—If an EPC has a receiving event(R), look for a matching shipping event (S). The match occurs inresponse to the bizLocation identifier in R being owned by the sameorganization as the shipTo identifier in S. Note: this event allows forsome leniency in the ownership structure. Large organizations may haveacquired or divested companies. Customers may be free to define morestrict rules that require an exact match. We can also apply regulatoryrules based on state jurisdiction. If a match cannot be found, then markthis EPC as “inconsistent” and return an error.

Shipping Without Receiving Or Commissioning Event—If a user performs aCustody Check before shipping, a determination can be made as to whetherthey have a matching commissioning or receiving event for that EPC. Thematch occurs in response to the event's bizLocation being owned by thesame organization that performs the check. If a match cannot be found,then mark this EPC as “inconsistent” and return an error.

Receiving Without Shipping Event—If a user performs a Custody Checkbefore receiving, a determination can be made to identify a matchingshipping event for that EPC. The match occurs in response to the event'sshipTo identifier being owned by the same organization that performs thecheck. If a match cannot be found, then mark this EPC as “inconsistent”and return an error.

Expired Trigger—If an EPC has a commissioning event with an expirationdate and today is beyond that date, then mark this EPC as “expired” andreturn an error.

Stolen Event—If any event has a disposition of “stolen,” then mark thisEPC as “stolen” and return an error.

Lost Event—If any event has a disposition of “lost,” then mark this EPCas “lost” and return an error.

Recalled Event—If any event has a disposition of “recalled,” then markthis EPC as “recalled” and return an error.

Context Location Not Owned By Requester—If a user performs a CustodyCheck using a location identifier owned by a different organization,then mark this EPC as “suspect” and return an error.

EPC In Two Places At Once—Events have bizLocation identifiers, whichtranslate to known addresses. If any two events indicate that theproduct travelled faster than 500 mph between the locations, then markthe EPC as “suspect” and return an error.

Cold Chain Trigger—If any event contains physical measurementinformation (i.e., temperature) that violate the constraints defined forthe product, then mark the EPC as “suspect” and return an error.

License Check—If any event contains license information, then check eachlicense against the proper authority. If any license is not “in goodstanding” or “current,” then mark the EPC as “suspect” and return anerror.

Too Many Checks—If the number of requests exceeds a given threshold,then mark the EPC as “suspect” and return an error. This can be anindication of fraudulent activity.

Rules to Create New Links from Related Events

Commissioning Event Link To Shipping Event—If a commissioning eventmatches a shipping event, then create an EventLink for them. A matchoccurs in response to the events referencing the same EPC, they havebizLocation identifiers owned by the same organization, thecommissioning event occurred before (or at the same time as) theshipping event, and an aggregation event has not occurred.

Shipping Event Link To Receiving Event—If a shipping event matches areceiving event, then create an EventLink for them. A match occurs inresponse to the events referencing the same EPC, the shipping event'sshipTo identifier is owned by the same organization as the receivingevent's bizLocation identifier, and the shipping event occurred before(or at the same time as) the receiving event.

Receiving Event Link To Shipping Event—If a receiving event matches ashipping event, then create an EventLink for them. A match occurs inresponse to the events referencing the same EPC, they have bizLocationidentifiers owned by the same organization, and the receiving eventoccurred before (or at the same time as) the shipping event.

Child Commissioning Event Link To Aggregation Event—If a commissioningevent matches an aggregation event, then create an EventLink for them. Amatch occurs when the aggregation event has a child EPC referenced inthe commissioning event, they have bizLocation identifiers owned by thesame organization, and the commissioning event occurred before (or atthe same time as) the aggregation event.

Parent Commissioning Event Link To Aggregation Event—If a commissioningevent matches an aggregation event, then create an EventLink for them. Amatch occurs in response to the aggregation event having a parent EPCreferenced in the commissioning event, they have bizLocation identifiersowned by the same organization, and the commissioning event occurredbefore (or at the same time as) the aggregation event.

Aggregation Event Link To Shipping Event—If an aggregation event matchesa shipping event, then create an EventLink for them. A match occurs inresponse to the events having bizLocation identifiers owned by the sameorganization, and the aggregation event occurred before (or at the sametime as) the shipping event.

Receiving Event Link To Disaggregation Event—If a receiving eventmatches a disaggregation event, then create an EventLink for them. Amatch occurs in response to the disaggregation event having a parent EPCreferenced in the receiving event, the events have bizLocationidentifiers owned by the same organization, and the receiving eventoccurred before (or at the same time as) the disaggregation event.

Disaggregation Event Link To Decommissioning Event—If a disaggregationevent matches a decommissioning event, then create an EventLink forthem. A match occurs when the disaggregation event has a child EPCreferenced in the decommissioning event, the events have bizLocationidentifiers owned by the same organization, and the disaggregation eventoccurred before (or at the same time as) the decommissioning event.

Aggregation Event Link To Disaggregation Event—If an aggregation eventmatches a disaggregation event, then create an EventLink for them. Amatch occurs in response to the events referencing the same child EPC,the events have bizLocation identifiers owned by the same organization,and the aggregation event occurred before (or at the same time as) thedisaggregation event.

Disaggregation Event Link To Aggregation Event—If a disaggregation eventmatches an aggregation event, then create an EventLink for them. A matchoccurs in response to the events referencing the same child EPC, theevents have bizLocation identifiers owned by the same organization, andthe disaggregation event occurred before (or at the same time as) theaggregation event.

Disaggregation Event Link to Shipping Event—If a disaggregation eventmatches a shipping event, then create an EventLink for them. A matchoccurs in response to the disaggregation event having a child EPCreferenced in the shipping event, the events have bizLocationidentifiers owned by the same organization, and the disaggregation eventoccurred before (or at the same time as) the shipping event.

Rules to Identify Unlinked Events

Commissioning Event Not Link To Shipping Event Or Aggregation Event—If acommissioning event cannot be matched to a shipping or aggregationevent, then mark it as unlinked.

Shipping Event Not Link To Commissioning Event Or Receiving Event—If ashipping event cannot be linked to a commissioning or receiving event,then mark it as unlinked.

Receiving Event Not Link To Shipping Event—If a receiving event cannotbe linked to a shipping event, then mark it as unlinked.

Disaggregation Event Not Link To Receiving Event—If a disaggregationevent cannot be linked to a receiving event, then mark it as unlinked.

Stolen Event Published—If an event has a disposition of “stolen,” thenmark it as unlinked.

Lost Event Published—If an event has a disposition of “lost,” then markit as unlinked.

Recalled Event Published—If an event has a disposition of “recalled,”then mark it as unlinked.

Miscellaneous Rules

LinkLink—From the EventLinks published by all of the preceding rules,join them together into trees of LinkLinks. This rule is appliedrecursively until all possibilities have been considered. This rule canbe run after previous rules are published and used to associate linksinto event chains.

RootLink—From all of the EventLinks and LinkLinks published by thepreceding rules, identify the root links of the trees. These have thecondition where no other links are connected to them. This rule can berun after previous rules to find the roots of all chains.

Rules may generate any of a variety of outputs after being applied,including, for example: an assessment of the event sequence state; alist of any errors, each with details describing the context; a list ofevents, containing both the linked and unlinked events; and a set ofroot links, each including a handle to an event chain.

In various embodiments, if the trading partners in a supply chain havesupplied a perfect set of events, then there is only one root link. Ifdata is missing, incorrect or corrupt, then the rules generate multipleroot links. This bad condition impacts the total assessment for theevent sequence. The rules described above cover various businesspractices within the supply chain. Parties may define their own rules tocover specific requirements. For instance, a pharmacy may requirecertain information from the manufacturer in the commissioning event.These rules can be applied to the commissioning event after a shippingevent indicates that the pharmacy will receive the product.

According to various embodiments, parties may generate and test theirown custom rules using an interactive web-based user interface. Invarious embodiments, rules can be generated using anif-condition-then-action format, with the conditions chosen from adrop-down list and the action limited to a set of common choices (error,mark, log, etc.). Parties in the supply chain may also generate rules inany other suitable manner. For example, such parties may parameterizeboth conditions and actions, and then save the rules to a persistentstore. A party's custom rules may be selectively applied in response tothe party participating in an event sequence.

Output from application of the rules can be handed in any suitablemanner according to any desired criteria. For example, rules output maybe handled differently depending on how the assessment was invoked: ifit was performed as part of a real-time Custody Check, then the list oferrors can be returned to the user; if a background process invoked theassessment, then the errors may trigger notification or alerts tosubscribed parties.

Events and Subscribers

Parties in the supply chain may subscribe to different events. Someexemplary subscriptions include: if a new shipping event contains ashipTo identifier owned by the subscribing party's organization, thenpush all of the upstream events to that party's communication channel;warn the subscribing party about any EPC that was recalled after it wasreceived by the subscribing party; warn the subscribing party about anyEPC that has expired received by the subscriber but that has notshipped. As discussed in more detail below, events that can be viewed byvarious parties in the supply chain may be subject to visibilityconstraints.

Embodiments of the disclosure can help various members of a supply chainto check an item to see if it has an appropriate chain of custody. Otherinformation can be made available to participants based on (for example)their agreements with their trading partners. For example, the statusinformation may indicate the history of the item is complete, or thatthere has been an alert on the item. If the item has an alert, a userwith sufficient access rights may, through a user interface, obtain moreinformation from the data repository, such as the error or warningmessage. In this manner, various embodiments of the disclosure canprovide such users with a quick, efficient visual verification of anitem's status.

Various embodiments may allow events and information to be “pushed” to aparty before the party receives the product associated with the eventsand information. This provides the receiving party with a “time window.”Among other things, this helps ensure that events are cached as close tothe receiving facility as possible, allows problems with the eventcontent to be resolved, reduces or eliminate the need for real-timequeries against remote databases, and allows the receiving party time tofix network or system outages.

By having a record of all the events, systems can notify parties ofadverse conditions. For example, a party may subscribe to any event thatindicates stolen or recalled EPCs. In various embodiments, a datarepository server may be configured to push recall events to parties inthe supply chain and, depending on the visibility rules in effect, listonly the recalled EPCs handled by the receiving party, but not EPCs thatwere not handled by the party.

In various embodiments, an exemplary process for recall notificationincludes receiving, by the data repository server, a recall event for aset of EPCs. In response to the recall notification, the serveridentifies all of the parties who published events for the EPCs in therecall notification. Visibility constraints are applied to the event.For each party in the supply chain, a modified event is generated thatincludes the recalled EPCs for that party, and then provided to theparty, allowing all parties who handled the recalled EPCs to quicklyknow if they have (or have handled) any recalled products.

Error Resolution

Exceptions may be triggered by a number of scenarios, and may becorrected in any suitable manner. For example, the party that publishedthe event that resulted in an exception may publish a correctingtransaction (such as a shipping transaction to return goods received inerror) in addition to their normal exception handling process.Exceptions may include information describing the business condition ofan item, such as “shipped,” “received,” “damaged,” etc.

Various embodiments may be configured to issue alerts or notificationsin response to detecting stolen or counterfeit products, and maygenerate any number and type of exceptions as desired. For example,exceptions may include:

Recall Events—situations where a manufacturer requires the return ofgoods or a product already shipped to market or sold to consumers butdiscovered to be defective, contaminated or unsafe.

Return Events—situations where the owner of a product returns theproduct back to the previous owner or a disposal entity/reversedistributor.

Unplanned Disaggregations—situations where items/containers becomedisassociated from their containers during transit, such as where apallet of cases is broken apart in order to fit in an airplane cargohold. The cases are no longer physically tied to the original pallet butthe data is still aggregated in an Aggregation event.

Data Exceptions—including:

Scan Read Errors—tag/barcode damaged and unreadable; tag/barcode hasinvalid format;

Documentation serial discrepancy (different serial numbers, correctlot);

Documentation lot discrepancy (correct serial numbers, different lot);

Documentation serial and lot are incorrect;

Wrong address;

Customer information is incorrect or missing;

Product descriptive information is incorrect or missing;

Product shipment information (invoice number, license number and/ordescription) is incorrect or missing;

Chain of Custody data is missing (transaction, ASN, and/or paperwork notreceived) for all or part of shipment;

Data security mismatch—Chain of Custody data received, but security keysdon't match and can't be read;

Chain of Custody data in invalid format;

Container identifier isn't in data;

Container identifier is in data, but children inside are not in data;and

Product shipped to wrong customer, Track and Trace data sent to correctcustomer.

Broken Chain of Custody—Data is missing from one or more previous touchpoints.

For example, where a Manufacturer ships to a Wholesaler, and aWholesaler ships to a Retailer, the Retailer reviews documentation anddata doesn't include the information from the original shipment fromManufacturer to Wholesaler. In another example, one of the parties ofthe supply chain does not publish events to the repository.

Suspected counterfeit shipment.

Undelivered Shipment.

Overage—Receipt of more physical product than expected.

Product received from unidentified sender—Shipment arrives from senderthat does not have valid sales order or purchase order.

Received product in error—Shipped product misdirected to wrong recipient(case intended for recipient A is received by recipient B).

Shortage—Receipt of physical product without appropriate event data orreceipt of event data without matching physical product. A shortage canbe for parts of a shipment or parts of a return shipment.

Damage—Part of shipment damaged in-transit.

In various embodiments, some error conditions can be resolved by asingle party, while other cases may require coordinated activity acrossthe supply chain. For example, resolution of an aggregation errordiscovered by a pharmacy may include the manufacturer and distributor.Likewise, an aggregation error for one container may affect anothercontainer, and therefore the problem may ripple through a differentdistributor. Systems and methods of this disclosure help facilitatecommunication among the various supply chain participants, as well as toinitiate and coordinate activities directed to resolving errors. Invarious embodiments, metrics and statistics can be gathered and createdto determine the level of effectiveness of various parties in resolvingerrors. This can help identify remedial training or other steps to helpimprove the overall quality of error resolution by the supply chain.

In various embodiments, a rules engine may be used to match immediateupstream with immediate downstream events into contiguous chains ofevents so that the position-dependent visibility constraints for eachtrading partner in a supply chain may be applied. For example, variousembodiments may be configured such that events may be received andtracked in any order, but events received out of order (such as ashipping event before a commissioning event) may trigger an alert.

In various embodiments, some rules (such as those described above) canbe used to organize events into links and chains. A rules engine may beused to perform an exhaustive search of all possible event combinations.In response to a rule joining two events into a Link, it inserts thatLink back into the rules engine. Rules from the rules engine can then beused to organize the output of prior rules, thereby efficiently andeffectively organizing EPCIS events. In various embodiments, this datastructure is built by procedural logic rather than a rules engine.

Some events (such as recall, lost or stolen events) may occurout-of-order at any time, and may be recognized by the rules engine asunlinked to any other events. According to various embodiments, based onwhere a Trading Partner published some events in a chain, adetermination is made as to the partner's visibility to all other eventswithin that chain as follows: Within an event chain, the earliest andlatest events published by the requesting partner are found; upstreamevents precede the earliest published event; and downstream eventssucceed the latest published event. In various embodiments, the“upstream events” are configured to apply before a Trading Partnerpublished a receiving event. If their supplier published a shippingevent where the “ShipTo” property identifies the Trading Partner, thenthat event can be treated as an “upstream event.” Among other things,this lets the partner inspect the event history before acceptingdelivery of the product and to factor this information into theirbusiness practices.

Visibility Framework Applied to Event Sequences

In various embodiments, the rendered representation (e.g., viaXML/HTML/JSON etc.) of the event may be controlled as a function of theobserving party's role and privileges in relation to events within anevent sequence. For example, a Trading Partner may be granted fullvisibility of events they publish, limited visibility of events upstreamfrom them in the Event Sequence, and full visibility of receiving eventsof other immediately downstream entities that the Trading Partnershipped to (also known as “one down events”). The Trading Partner may berestricted, however, from viewing events beyond the receiving event ofthe entities immediately downstream from the Trading Partner (also knownas “greater than one down events”).

Various embodiments may operate in conjunction with any number and typeof visibility constraints, including restrictions on events that can beseen or not seen. For example, the local attribute of a “greater thanone down” event may be raised in granularity to the state level whichgives the upstream trading partner state level visibility of where goodsare handled but not specifically the handling party. Visibility rulesmay also be applied to multiple event chains within the request context.This can happen under failure conditions like missing events, duplicatepackaging, or fraud.

The following exemplary definitions may be used to describe aspects of atrading partner's visibility with regards to events in an eventsequence:

Visibility Subject—anything that the trading partner may see, includingevent properties, events positioned within an event sequence, CustodyCheck actions and their properties, assessment results, etc.

Visibility Constraint—a level of granularity applied to a VisibilitySubject. Examples are transparent, partially obscured, or hidden.

Visibility Specification—an association of Visibility Subjects toVisibility onstraints. This type parameterizes a filter to be applied toany thing that may be viewed.

Visibility Contract—captures the business logic of “who can see what andwhen”. The event publisher may also define Visibility Contracts tocontrol how other parties view data. Event types may be determined bytheir order and relationship to the observe (e.g.,upstream<published<one-down<greater-than-one-down)

Given the previous definitions of upstream and downstream events, FIG. 9depicts an exemplary process 900 that various embodiments may executebefore rendering events to an observer. As shown in FIG. 9 , exemplarymethod 900 includes:

1. Find the Event Sequence according to the previous discussion (910).

2. Determine the Visibility Specification from the highest prioritysource (920):

-   -   A. The observer's company policy or role    -   B. The observer's policy or role    -   C. The Trading Partner who published each event    -   D. The system-wide default

3. Apply the Visibility Constraints to all Subjects according to theSpecifications (930).

4. Filter out any empty results and present to the observer (940).

Visibility Contracts

A Trading Partner may grant expanded visibility of its published eventsto other partners that the other partners would not otherwise havevisibility to. This can be achieved by the publishing Trading Partnercreating a contract between itself and another partner. This contractmay have a date effective range associated with it.

In various embodiments, Trading Partners in a supply chain may uploadVisibility Contracts to the external data repository server. Thevisibility contracts may be in any format (such as application-specificXML format) and have any properties, such as the publisher of thecontract, the associated events, the consumer of data (also called the“observer”), the effective start and end dates of the contract, and/orthe Visibility Specification that applies in response to the consumerviewing publisher's events.

Systems and methods of the present disclosure may apply visibilityconstraints to some or all events. Any events pushed to a subscribedparty can be so filtered. Various embodiments may also transform thepushed events to solve incompatibilities in the supply chain.

In various embodiments, for example, a pharmacy trading partner mayrequire product data (dosage, active ingredients, drug name) within thecommissioning events. However the manufacturer may publish such data toa separate repository (i.e., GSDN) rather than supply it viacommissioning events. In such cases, the central data repository servermay be configured to retrieve the product data needed by the pharmacyand augment any commissioning events with this information viewed by thepharmacy. This not only provides the pharmacy with the information itneeds, but solves the problem without requiring the manufacturer toalter its process.

Systems and methods of the present disclosure may also be configured tohelp bridge evolving data processing or business transaction standards,namely by translating between different versions of a standard used bydifferent parties within the same supply chain. Various embodiments mayalso be configured to normalize or format in different ways fordifferent members of a supply chain. For example, a pharmacy may wantall values of the national drug code (NDC) to be in a specific format.

FIG. 10 depicts an exemplary process 1000 that various embodiments mayimplement that combine various visibility, transformation, and pushfeatures. As shown in FIG. 10 , exemplary process 1000 includes:

1. When a shipping event contains a shipTo identifier for a receivingparty, gather all upstream events (910).

2. Determine the Visibility Specification from the highest prioritysource (920) as described above.

2. Apply visibility constraints to the events, based on the default andpublishers' policies (1030).

3. Enhance the events with data from other sources, based on thereceiving party's policies (1040).

4. Transform event content, based on the receiving party's policies(1050).

5. Push the modified events to the receiving party via a communicationchannel (1060).

In accordance with various embodiments, FIGS. 11-21 include exemplaryscreenshots associated with a hypothetical sequence of events associatedwith items produced by manufacturer 310 and shipped to distributor 320,then shipped from distributor 320 to pharmacy 330. In this example, thevisibility constraints for this supply chain ensures that: Pharmacy 330can see all of the locations where the events took place; Distributor320 can see that a disaggregation event took place, but not where theevent occurred; and Manufacturer 310 cannot see any locations beyond theDistributor's receiving event.

FIG. 11 illustrates the event sequence (also referred to as the “chainof custody”) for a particular pharmaceutical item from the perspectiveof manufacturer 310. FIG. 12 illustrates the chain of custody from theperspective of distributor 320, while FIG. 13 illustrates thedistributor's view of the events published by manufacturer 310 and FIG.14 illustrates the distributor's view of its own events. FIG. 15illustrates the chain of custody from the perspective of pharmacy 330.FIG. 16 illustrates the events published by pharmacy 330 (as viewed bythe pharmacy), while FIG. 17 illustrates the events published bymanufacturer 310 and distributor 320 from the perspective of pharmacy330.

The chain of custody shows that Manufacturer 310 packaged 2 items withinshipping container #440 (see aggregation event in FIG. 13 ), andDistributor 320 received and opened the container (see receiving anddisaggregation events in FIG. 14 ). A few days later the Items werepackaged into a different shipping container (#297—see aggregation eventin FIG. 14 ), then shipped to Pharmacy 330. Pharmacy 330 received thecontainer, then later removed the Items (receiving and disaggregationevents in FIG. 16 ). As shown in FIG. 14 , Distributor 320 performed acontainer Custody Check before shipping to Pharmacy 330. Among otherthings, this helps ensure that all items within the container are stillin a consistent state (i.e.—no recalls, counterfeits, etc.). Also shownfrom the screenshots, the Distributor can see only the date and time ofDisaggregation, not the event details.

From the Pharmacy's perspective, the chain of custody shows thatManufacturer 310 packaged 2 items within shipping container #994;Distributor 320 received and shipped the container as-is, unopened, andPharmacy 330 performed a Custody Check before receiving the container.The chain of custody returned “good,” and Pharmacy 330 accepted thecontainer then opened it a few days later. In this example, it can beseen that Items in the Pharmacy's Disaggregation event match theManufacturer's Aggregation event.

FIG. 18 illustrates a lot report requested by manufacturer 310 prior toissuing a recall. In this example, the manufacturer's view of thelocations of the items is limited to the state they are in. FIG. 19illustrates the distributor's view of the chain of custody aftermanufacturer 310 issued a recall for the item. In this example,Distributor 320 performed one Custody Check before receiving, thenanother before shipping the product to Pharmacy 330. This second checkdetects that Manufacturer 310 published a “holding” event. Distributor320 interrupts the normal shipping procedure because of this recalledstate. FIG. 20 illustrates the chain of custody for the item after arecall is issued by the manufacturer from the Distributor's perspective,and FIG. 21 the Distributor's view of the holding event.

Various embodiments can track product containers or packages uniquelyserialized or identified at the lowest sellable unit level (smallestpackage or immediate container) and can be used by any number ofentities, including manufacturers, wholesalers, and pharmacies(providers) in a supply chain. Various embodiments also allowinteraction with other systems, including proprietary systems used bydifferent trading partners in a supply chain. In various embodiments,communication with such entities is performed via an applicationprogramming interface (API) supported by the external data repository toallow communication between the repository and the various tradingpartners in the supply chain.

Various embodiments may secure data stored in the repository (such astrack and trace data and other data used to facilitate chain of custodytracking) in any suitable manner, including various forms of encryption.Various embodiments may also redact data provided to members of a supplychain to, for example, maintain the confidentiality of a patient using ahealthcare product.

Reporting

Various embodiments may receive, gather, and analyze metrics regardingevents in a supply chain, and may provide such metrics and otherinformation to users via various reports. Such reports may includeinformation about products and their availability in the supply chain aswell as custody chains for individual items or groups of items orcontainers. Reports can be provided in any suitable manner, such as viaa web user interface or via an electronic communication.

The following is a non-exclusive, exemplary list of data that may beprovided in a report provided by various embodiments:

Event Information: Event/Transaction Identifier; Item/ContainerIdentifier; Event Timestamp; Event Type; Event Location(s); EventParty/Parties; Event Business Step; Event Disposition; Event Action;Sales Invoice Number or customer-specific shipping reference numberlinked to invoice; Number of Containers in event.

Product Information: NDC; Batch/Lot Number and Expiration Date (from thecommissioning event); Trade or generic name of drug; Quantity of Drug;Dosage Form; Strength; Container Size.

Party Information: Manufacturer Name; Federal Manufacturer'sRegistration Number (or state license number); Name of each personcertifying delivery/receipt of drug.

Location Information: Principal address of the Manufacturer; Address ofeach person certifying delivery/receipt of drug.

The detailed description of various embodiments herein makes referenceto the accompanying figures, which show the exemplary embodiments by wayof illustration. While these exemplary embodiments are described insufficient detail to enable those skilled in the art to practice thedisclosure, it should be understood that other embodiments may berealized and that logical and mechanical changes may be made withoutdeparting from the spirit and scope of the disclosure. Thus, thedetailed description herein is presented for purposes of illustrationonly and not of limitation. For example, the steps recited in any of themethod or process descriptions may be executed in any order and are notlimited to the order presented. Moreover, any of the functions or stepsmay be outsourced to or performed by one or more third parties.Furthermore, any reference to singular includes plural embodiments, andany reference to more than one component may include a singularembodiment. Definitions for terms that may be used throughout thisdisclosure are exemplary and non-exclusive. The terms used in thisdisclosure may have alternate meanings or definitions consistent withthe disclosure, and the present disclosure is not limited to anyparticular definition or interpretation of any particular term.

Systems, methods and computer program products are provided. In thedetailed description herein, references to “various embodiments,” “oneembodiment,” “an embodiment,” “an example embodiment,” etc., indicatethat the embodiment described may include a particular feature,structure, or characteristic, but every embodiment may not necessarilyinclude the particular feature, structure, or characteristic. Moreover,such phrases are not necessarily referring to the same embodiment.Further, when a particular feature, structure, or characteristic isdescribed in connection with an embodiment, it is submitted that it iswithin the knowledge of one skilled in the art to affect such feature,structure, or characteristic in connection with other embodimentswhether or not explicitly described. After reading the description, itwill be apparent to one skilled in the relevant art(s) how to implementthe disclosure in alternative embodiments.

Any communication, transmission and/or channel discussed herein mayinclude any system or method for delivering content (e.g., data,information, metadata, etc.), and/or the content itself. The content maybe presented in any form or medium, and in various embodiments, thecontent may be delivered electronically and/or capable of beingpresented electronically.

In various embodiments, the methods described herein are implementedusing the various particular machines described herein. The methodsdescribed herein may be implemented using the below particular machines,and those hereinafter developed, in any suitable combination, as wouldbe appreciated immediately by one skilled in the art. Further, as isunambiguous from this disclosure, the methods described herein mayresult in various transformations of certain articles.

For the sake of brevity, conventional data networking, applicationdevelopment and other functional aspects of the systems (and componentsof the individual operating components of the systems) may not bedescribed in detail herein. Furthermore, the connecting lines shown inthe various figures contained herein are intended to represent exemplaryfunctional relationships and/or physical couplings between the variouselements. It should be noted that many alternative or additionalfunctional relationships or physical connections may be present in apractical system.

The various system components discussed herein may include one or moreof the following: a host server or other computing systems including aprocessor for processing digital data; a memory coupled to the processorfor storing digital data; an input digitizer coupled to the processorfor inputting digital data; an application program stored in the memoryand accessible by the processor for directing processing of digital databy the processor; a display device coupled to the processor and memoryfor displaying information derived from digital data processed by theprocessor; and a plurality of databases. Various databases used hereinmay include: client data; merchant data; financial institution data;and/or like data useful in the operation of the system. As those skilledin the art will appreciate, user computer may include an operatingsystem (e.g., Windows NT, Windows 95/98/2000, Windows XP, Windows Vista,Windows 7, OS2, UNIX, Linux, Solaris, MacOS, etc.) as well as variousconventional support software and drivers typically associated withcomputers.

The present system or any part(s) or function(s) thereof may beimplemented using hardware, software or a combination thereof and may beimplemented in one or more computer systems or other processing systems.However, the manipulations performed by embodiments were often referredto in terms, such as matching or selecting, which are commonlyassociated with mental operations performed by a human operator. No suchcapability of a human operator is necessary, or desirable in most cases,in any of the operations described herein. Rather, the operations may bemachine operations. Useful machines for performing the variousembodiments include general purpose digital computers or similardevices.

Various embodiments may be directed toward one or more computer systemscapable of carrying out the functionality described herein. The computersystem may include one or more processors connected to a communicationinfrastructure (e.g., a communications bus, cross over bar, or network).Such computer systems can also include a display interface that forwardsgraphics, text, and other data from the communication infrastructure (orfrom a frame buffer not shown) for display on a display unit. Suchcomputer systems may include one or more memories, such as arandom-access memory (RAM), read-only memory (ROM), a hard disk driveand/or a removable storage drive, a floppy disk drive, a magnetic tapedrive, and/or an optical disk drive. The removable storage drive readsfrom and/or writes to a removable storage unit in a well-known manner.Removable storage unit represents a floppy disk, magnetic tape, opticaldisk, etc. which is read by and written to by removable storage drive.As will be appreciated, the removable storage unit includes a computerusable storage medium having stored therein computer software and/ordata.

In various embodiments, secondary memory may include other similardevices for allowing computer programs or other instructions to beloaded into computer system. Such devices may include, for example, aremovable storage unit and an interface. Examples of such may include aprogram cartridge and cartridge interface (such as that found in videogame devices), a removable memory chip (such as an erasable programmableread only memory (EPROM), or programmable read only memory (PROM)) andassociated socket, and other removable storage units and interfaces,which allow software and data to be transferred from the removablestorage unit to computer system.

Computer system may also include a communications interface.Communications interface allows software and data to be transferredbetween computer system and external devices. Examples of communicationsinterface may include a modem, a network interface (such as an Ethernetcard), a communications port, a Personal Computer Memory CardInternational Association (PCMCIA) slot and card, etc. Software and datatransferred via communications interface are in the form of signalswhich may be electronic, electromagnetic, optical or other signalscapable of being received by communications interface. These signals areprovided to communications interface via a communications path (e.g.,channel). This channel carries signals and may be implemented usingwire, cable, fiber optics, a telephone line, a cellular link, a radiofrequency (RF) link, wireless and other communications channels.

The terms “computer program medium” and “computer usable medium” and“computer readable medium” are used to generally refer to media such asremovable storage drive and a hard disk installed in hard disk drive.These computer program products provide software to computer system.

Computer programs (also referred to as computer control logic) may bestored in a main memory and/or secondary memory. Computer programs mayalso be received via communications interface. Such computer programs,when executed, enable the computer system to perform the features asdiscussed herein. In particular, the computer programs, when executed,enable the processor to perform the features of various embodiments.Accordingly, such computer programs represent controllers of thecomputer system.

In various embodiments, software may be stored in a computer programproduct and loaded into computer system using removable storage drive,hard disk drive or communications interface. The control logic(software), when executed by the processor, causes the processor toperform the functions of various embodiments as described herein. Invarious embodiments, hardware components such as application specificintegrated circuits (ASICs). Implementation of the hardware statemachine so as to perform the functions described herein will be apparentto persons skilled in the relevant art(s).

In various embodiments, the server may include application servers(e.g., WEB SPHERE, WEB LOGIC, JBOSS). In various embodiments, the servermay include web servers (e.g., APACHE, IIS, GWS, SUN JAVA SYSTEM WEBSERVER).

A web client includes any device (e.g., personal computer) whichcommunicates via any network, for example such as those discussedherein. Such browser applications comprise Internet browsing softwareinstalled within a computing unit or a system to conduct onlinetransactions and/or communications. These computing units or systems maytake the form of a computer or set of computers, although other types ofcomputing units or systems may be used, including laptops, notebooks,tablets, hand held computers, personal digital assistants, set-topboxes, workstations, computer-servers, main frame computers,mini-computers, PC servers, pervasive computers, network sets ofcomputers, personal computers, such as iPads, iMACs, and MacBooks,kiosks, terminals, point of sale (POS) devices and/or terminals,televisions, or any other device capable of receiving data over anetwork. A web-client may run Microsoft Internet Explorer, MozillaFirefox, Google Chrome, Apple Safari, or any other of the myriadsoftware packages available for browsing the internet.

Practitioners will appreciate that a web client may or may not be indirect contact with an application server. For example, a web client mayaccess the services of an application server through another serverand/or hardware component, which may have a direct or indirectconnection to an Internet server. For example, a web client maycommunicate with an application server via a load balancer. In anexemplary embodiment, access is through a network or the Internetthrough a commercially-available web-browser software package.

As those skilled in the art will appreciate, a web client includes anoperating system (e.g., Windows NT, 95/98/2000/CE/Mobile, OS2, UNIX,Linux, Solaris, MacOS, PalmOS, etc.) as well as various conventionalsupport software and drivers typically associated with computers. A webclient may include any suitable personal computer, network computer,workstation, personal digital assistant, cellular phone, smart phone,minicomputer, mainframe or the like. A web client can be in a home orbusiness environment with access to a network. In an exemplaryembodiment, access is through a network or the Internet through acommercially available web-browser software package. A web client mayimplement security protocols such as Secure Sockets Layer (SSL) andTransport Layer Security (TLS). A web client may implement severalapplication layer protocols including http, https, ftp, and sftp.

In various embodiments, components, modules, and/or engines of system100 may be implemented as micro-applications or micro-apps. Micro-appsare typically deployed in the context of a mobile operating system,including for example, a Palm mobile operating system, a Windows mobileoperating system, an Android Operating System, Apple iOS, a Blackberryoperating system and the like. The micro-app may be configured toleverage the resources of the larger operating system and associatedhardware via a set of predetermined rules which govern the operations ofvarious operating systems and hardware resources. For example, where amicro-app desires to communicate with a device or network other than themobile device or mobile operating system, the micro-app may leverage thecommunication protocol of the operating system and associated devicehardware under the predetermined rules of the mobile operating system.Moreover, where the micro-app desires an input from a user, themicro-app may be configured to request a response from the operatingsystem which monitors various hardware components and then communicatesa detected input from the hardware to the micro-app.

As used herein, the term “network” includes any cloud, cloud computingsystem or electronic communications system or method which incorporateshardware and/or software components. Communication among the parties maybe accomplished through any suitable communication channels, such as,for example, a telephone network, an extranet, an intranet, Internet,point of interaction device (point of sale device, personal digitalassistant (e.g., iPhone®, Palm Pilot®, Blackberry®), cellular phone,kiosk, etc.), online communications, satellite communications, off-linecommunications, wireless communications, transponder communications,local area network (LAN), wide area network (WAN), virtual privatenetwork (VPN), networked or linked devices, keyboard, mouse and/or anysuitable communication or data input modality. Moreover, although thesystem is frequently described herein as being implemented with TCP/IPcommunications protocols, the system may also be implemented using IPX,Appletalk, IP-6, NetBIOS, OSI, any tunneling protocol (e.g., IPsec,SSH), or any number of existing or future protocols. If the network isin the nature of a public network, such as the Internet, it may beadvantageous to presume the network to be insecure and open toeavesdroppers. Specific information related to the protocols, standards,and application software utilized in connection with the Internet isgenerally known to those skilled in the art and, as such, need not bedetailed herein. See, for example, DILIP NAIK, INTERNET STANDARDS ANDPROTOCOLS (1998); JAVA 2 COMPLETE, various authors, (Sybex 1999);DEBORAH RAY AND ERIC RAY, MASTERING HTML 4.0 (1997); and LOSHIN, TCP/IPCLEARLY EXPLAINED (1997) and DAVID GOURLEY AND BRIAN TOTTY, HTTP, THEDEFINITIVE GUIDE (2002), the contents of which are hereby incorporatedby reference.

The various system components may be independently, separately orcollectively suitably coupled to the network via data links whichincludes, for example, a connection to an Internet Service Provider(ISP) over the local loop as is typically used in connection withstandard modem communication, cable modem, Dish networks, ISDN, DigitalSubscriber Line (DSL), or various wireless communication methods, see,e.g., GILBERT HELD, UNDERSTANDING DATA COMMUNICATIONS (1996), which ishereby incorporated by reference. It is noted that the network may beimplemented as other types of networks, such as an interactivetelevision (ITV) network. Moreover, the system contemplates the use,sale or distribution of any goods, services or information over anynetwork having similar functionality described herein.

“Cloud” or “Cloud computing” includes a model for enabling convenient,on-demand network access to a shared pool of configurable computingresources (e.g., networks, servers, storage, applications, and services)that can be rapidly provisioned and released with minimal managementeffort or service provider interaction. Cloud computing may includelocation-independent computing, whereby shared servers provideresources, software, and data to computers and other devices on demand.For more information regarding cloud computing, see the NIST's (NationalInstitute of Standards and Technology) definition of cloud computing athttp://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf (lastvisited June 2012), which is hereby incorporated by reference in itsentirety.

As used herein, “transmit” may include sending electronic data from onesystem component to another over a network connection. Additionally, asused herein, “data” may include encompassing information such ascommands, queries, files, data for storage, and the like in digital orany other form.

The system contemplates uses in association with web services, utilitycomputing, pervasive and individualized computing, security and identitysolutions, autonomic computing, cloud computing, commodity computing,mobility and wireless solutions, open source, biometrics, grid computingand/or mesh computing.

Any databases discussed herein may include relational, hierarchical,graphical, or object-oriented structure and/or any other databaseconfigurations. Common database products that may be used to implementthe databases include DB2 by IBM (Armonk, N.Y.), various databaseproducts available from Oracle Corporation (Redwood Shores, Calif.),Microsoft Access or Microsoft SQL Server by Microsoft Corporation(Redmond, Wash.), MySQL by MySQL AB (Uppsala, Sweden), or any othersuitable database product. Moreover, the databases may be organized inany suitable manner, for example, as data tables or lookup tables. Eachrecord may be a single file, a series of files, a linked series of datafields or any other data structure. Association of certain data may beaccomplished through any desired data association technique such asthose known or practiced in the art. For example, the association may beaccomplished either manually or automatically. Automatic associationtechniques may include, for example, a database search, a databasemerge, GREP, AGREP, SQL, using a key field in the tables to speedsearches, sequential searches through all the tables and files, sortingrecords in the file according to a known order to simplify lookup,and/or the like. The association step may be accomplished by a databasemerge function, for example, using a “key field” in pre-selecteddatabases or data sectors. Various database tuning steps arecontemplated to optimize database performance. For example, frequentlyused files such as indexes may be placed on separate file systems toreduce In/Out (“I/O”) bottlenecks.

More particularly, a “key field” partitions the database according tothe high-level class of objects defined by the key field. For example,certain types of data may be designated as a key field in a plurality ofrelated data tables and the data tables may then be linked on the basisof the type of data in the key field. The data corresponding to the keyfield in each of the linked data tables is preferably the same or of thesame type. However, data tables having similar, though not identical,data in the key fields may also be linked by using AGREP, for example.In accordance with one embodiment, any suitable data storage techniquemay be utilized to store data without a standard format. Data sets maybe stored using any suitable technique, including, for example, storingindividual files using an ISO/IEC 7816-4 file structure; implementing adomain whereby a dedicated file is selected that exposes one or moreelementary files containing one or more data sets; using data setsstored in individual files using a hierarchical filing system; data setsstored as records in a single file (including compression, SQLaccessible, hashed via one or more keys, numeric, alphabetical by firsttuple, etc.); Binary Large Object (BLOB); stored as ungrouped dataelements encoded using ISO/IEC 7816-6 data elements; stored as ungroupeddata elements encoded using ISO/IEC Abstract Syntax Notation (ASN.1) asin ISO/IEC 8824 and 8825; and/or other proprietary techniques that mayinclude fractal compression methods, image compression methods, etc.

One skilled in the art will also appreciate that, for security reasons,any databases, systems, devices, servers or other components of thesystem may consist of any combination thereof at a single location or atmultiple locations, wherein each database or system includes any ofvarious suitable security features, such as firewalls, access codes,encryption, decryption, compression, decompression, and/or the like.

Encryption may be performed by way of any of the techniques nowavailable in the art or which may become available—e.g., Twofish, RSA,El Gamal, Schorr signature, DSA, PGP, PKI, GPG (GnuPG), and symmetricand asymmetric cryptosystems.

The computing unit of the web client may be further equipped with anInternet browser connected to the Internet or an intranet using standarddial-up, cable, DSL or any other Internet protocol known in the art.Transactions originating at a web client may pass through a firewall inorder to prevent unauthorized access from users of other networks.Further, additional firewalls may be deployed between the varyingcomponents of CMS to further enhance security.

Firewall may include any hardware and/or software suitably configured toprotect CMS components and/or enterprise computing resources from usersof other networks. Further, a firewall may be configured to limit orrestrict access to various systems and components behind the firewallfor web clients connecting through a web server. Firewall may reside invarying configurations including Stateful Inspection, Proxy based,access control lists, and Packet Filtering among others. Firewall may beintegrated within an web server or any other CMS components or mayfurther reside as a separate entity. A firewall may implement networkaddress translation (“NAT”) and/or network address port translation(“NAPT”). A firewall may accommodate various tunneling protocols tofacilitate secure communications, such as those used in virtual privatenetworking. A firewall may implement a demilitarized zone (“DMZ”) tofacilitate communications with a public network such as the Internet. Afirewall may be integrated as software within an Internet server, anyother application server components or may reside within anothercomputing device or may take the form of a standalone hardwarecomponent.

The computers discussed herein may provide a suitable website or otherInternet-based graphical user interface which is accessible by users. Inone embodiment, the Microsoft Internet Information Server (IIS),Microsoft Transaction Server (MTS), and Microsoft SQL Server, are usedin conjunction with the Microsoft operating system, Microsoft NT webserver software, a Microsoft SQL Server database system, and a MicrosoftCommerce Server. Additionally, components such as Access or MicrosoftSQL Server, Oracle, Sybase, Informix MySQL, Interbase, etc., may be usedto provide an Active Data Object (ADO) compliant database managementsystem. In one embodiment, the Apache web server is used in conjunctionwith a Linux operating system, a MySQL database, and the Perl, PHP,and/or Python programming languages.

Any of the communications, inputs, storage, databases or displaysdiscussed herein may be facilitated through a website having web pages.The term “web page” as it is used herein is not meant to limit the typeof documents and applications that might be used to interact with theuser. For example, a typical website might include, in addition tostandard HTML documents, various forms, Java applets, JavaScript, activeserver pages (ASP), common gateway interface scripts (CGI), extensiblemarkup language (XML), dynamic HTML, cascading style sheets (CSS), AJAX(Asynchronous Javascript And XML), helper applications, plug-ins, andthe like. A server may include a web service that receives a requestfrom a web server, the request including a URL(http://yahoo.com/stockquotes/ge) and an IP address (123.56.789.234).The web server retrieves the appropriate web pages and sends the data orapplications for the web pages to the IP address. Web services areapplications that are capable of interacting with other applicationsover a communications means, such as the internet. Web services aretypically based on standards or protocols such as XML, SOAP, AJAX, WSDLand UDDI. Web services methods are well known in the art, and arecovered in many standard texts. See, e.g., ALEX NGHIEM, IT WEB SERVICES:A ROADMAP FOR THE ENTERPRISE (2003), hereby incorporated by reference.

Middleware may include any hardware and/or software suitably configuredto facilitate communications and/or process transactions betweendisparate computing systems. Middleware components are commerciallyavailable and known in the art. Middleware may be implemented throughcommercially available hardware and/or software, through custom hardwareand/or software components, or through a combination thereof. Middlewaremay reside in a variety of configurations and may exist as a standalonesystem or may be a software component residing on the Internet server.Middleware may be configured to process transactions between the variouscomponents of an application server and any number of internal orexternal systems for any of the purposes disclosed herein. Web SphereMQ™ (formerly MQSeries) by IBM, Inc. (Armonk, N.Y.) is an example of acommercially available middleware product. An Enterprise Service Bus(“ESB”) application is another example of middleware.

Practitioners will also appreciate that there are a number of methodsfor displaying data within a browser-based document. Data may berepresented as standard text or within a fixed list, scrollable list,drop-down list, editable text field, fixed text field, pop-up window,and the like. Likewise, there are a number of methods available formodifying data in a web page such as, for example, free text entry usinga keyboard, selection of menu items, check boxes, option boxes, and thelike.

The system and method may be described herein in terms of functionalblock components, screen shots, optional selections and variousprocessing steps. It should be appreciated that such functional blocksmay be realized by any number of hardware and/or software componentsconfigured to perform the specified functions. For example, the systemmay employ various integrated circuit components, e.g., memory elements,processing elements, logic elements, look-up tables, and the like, whichmay carry out a variety of functions under the control of one or moremicroprocessors or other control devices. Similarly, the softwareelements of the system may be implemented with any programming orscripting language such as C, C++, C#, Java, JavaScript, VBScript,Macromedia Cold Fusion, COBOL, Microsoft Active Server Pages, assembly,PERL, PHP, awk, Python, Visual Basic, SQL Stored Procedures, PL/SQL, anyUNIX shell script, and extensible markup language (XML) with the variousalgorithms being implemented with any combination of data structures,objects, processes, routines or other programming elements. Further, itshould be noted that the system may employ any number of conventionaltechniques for data transmission, signaling, data processing, networkcontrol, and the like. Still further, the system could be used to detector prevent security issues with a client-side scripting language, suchas JavaScript, VBScript or the like. For a basic introduction ofcryptography and network security, see any of the following references:(1) “Applied Cryptography: Protocols, Algorithms, And Source Code In C,”by Bruce Schneier, published by John Wiley & Sons (second edition,1995); (2) “Java Cryptography” by Jonathan Knudson, published byO'Reilly & Associates (1998); (3) “Cryptography & Network Security:Principles & Practice” by William Stallings, published by Prentice Hall;all of which are hereby incorporated by reference.

As will be appreciated by one of ordinary skill in the art, the systemmay be embodied as a customization of an existing system, an add-onproduct, a processing apparatus executing upgraded software, astand-alone system, a distributed system, a method, a data processingsystem, a device for data processing, and/or a computer program product.Accordingly, any portion of the system or a module may take the form ofa processing apparatus executing code, an internet based embodiment, anentirely hardware embodiment, or an embodiment combining aspects of theinternet, software and hardware. Furthermore, the system may take theform of a computer program product on a computer-readable storage mediumhaving computer-readable program code means embodied in the storagemedium. Any suitable computer-readable storage medium may be utilized,including hard disks, CD-ROM, optical storage devices, magnetic storagedevices, and/or the like.

The systems and methods are described herein with reference to screenshots, block diagrams and flowchart illustrations of methods, apparatus(e.g., systems), and computer program products according to variousembodiments. It will be understood that each functional block of theblock diagrams and the flowchart illustrations, and combinations offunctional blocks in the block diagrams and flowchart illustrations,respectively, can be implemented by computer program instructions.

Computer program instructions may be loaded onto a general purposecomputer, special purpose computer, or other programmable dataprocessing apparatus to produce a machine, such that the instructionsthat execute on the computer or other programmable data processingapparatus create means for implementing the functions specified in theflowchart block or blocks. These computer program instructions may alsobe stored in a computer-readable memory that can direct a computer orother programmable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablememory produce an article of manufacture including instruction meanswhich implement the function specified in the flowchart block or blocks.The computer program instructions may also be loaded onto a computer orother programmable data processing apparatus to cause a series ofoperational steps to be performed on the computer or other programmableapparatus to produce a computer-implemented process such that theinstructions which execute on the computer or other programmableapparatus provide steps for implementing the functions specified in theflowchart block or blocks.

Accordingly, functional blocks of the block diagrams and flowchartillustrations support combinations of means for performing the specifiedfunctions, combinations of steps for performing the specified functions,and program instruction means for performing the specified functions. Itwill also be understood that each functional block of the block diagramsand flowchart illustrations, and combinations of functional blocks inthe block diagrams and flowchart illustrations, can be implemented byeither special purpose hardware-based computer systems which perform thespecified functions or steps, or suitable combinations of specialpurpose hardware and computer instructions. Further, illustrations ofthe process flows and the descriptions thereof may make reference touser windows, webpages, websites, web forms, prompts, etc. Practitionerswill appreciate that the illustrated steps described herein may comprisein any number of configurations including the use of windows, webpages,web forms, popup windows, prompts and the like. It should be furtherappreciated that the multiple steps as illustrated and described may becombined into single webpages and/or windows but have been expanded forthe sake of simplicity. In other cases, steps illustrated and describedas single process steps may be separated into multiple webpages and/orwindows but have been combined for simplicity.

The term “non-transitory” is to be understood to remove only propagatingtransitory signals per se from the claim scope and does not relinquishrights to all standard computer-readable media that are not onlypropagating transitory signals per se. Stated another way, the meaningof the term “non-transitory computer-readable medium” and“non-transitory computer-readable storage medium” should be construed toexclude only those types of transitory computer-readable media whichwere found in In Re Nuijten to fall outside the scope of patentablesubject matter under 35 U.S.C. § 101.

Benefits, other advantages, and solutions to problems have beendescribed herein with regard to specific embodiments. However, thebenefits, advantages, solutions to problems, and any elements that maycause any benefit, advantage, or solution to occur or become morepronounced are not to be construed as critical, required, or essentialfeatures or elements of the disclosure. The scope of the disclosure isaccordingly to be limited by nothing other than the appended claims, inwhich reference to an element in the singular is not intended to mean“one and only one” unless explicitly so stated, but rather “one ormore.” Moreover, where a phrase similar to ‘at least one of A, B, and C’or ‘at least one of A, B, or C’ is used in the claims or specification,it is intended that the phrase be interpreted to mean that A alone maybe present in an embodiment, B alone may be present in an embodiment, Calone may be present in an embodiment, or that any combination of theelements A, B and C may be present in a single embodiment; for example,A and B, A and C, B and C, or A and B and C. Although the disclosureincludes a method, it is contemplated that it may be embodied ascomputer program instructions on a tangible computer-readable carrier,such as a magnetic or optical memory or a magnetic or optical disk. Allstructural, chemical, and functional equivalents to the elements of theabove-described various embodiments that are known to those of ordinaryskill in the art are expressly incorporated herein by reference and areintended to be encompassed by the present claims. Moreover, it is notnecessary for a device or method to address each and every problemsought to be solved by the present disclosure, for it to be encompassedby the present claims. Furthermore, no element, component, or methodstep in the present disclosure is intended to be dedicated to the publicregardless of whether the element, component, or method step isexplicitly recited in the claims. No claim element herein is to beconstrued under the provisions of 35 U.S.C. 112, sixth paragraph, unlessthe element is expressly recited using the phrase “means for.” As usedherein, the terms “comprises,” “comprising,” or any other variationthereof, are intended to cover a non-exclusive inclusion, such that aprocess, method, article, or apparatus that comprises a list of elementsdoes not include only those elements but may include other elements notexpressly listed or inherent to such process, method, article, orapparatus.

What is claimed is:
 1. A method comprising: receiving, by a processor, adisaggregation event in a supply chain, wherein the disaggregation eventincludes removing items from a container, and wherein the disaggregationevent includes a parent identifier and a child identifier; associating,by the processor, the disaggregation event with the parent identifier;associating, by the processor, the disaggregation event with the childidentifier; storing, by the processor, the parent identifier and thechild identifier in a database as ungrouped data elements formatted as ablock of binary (BLOB); tuning, by the processor, the database tooptimize database performance; obtaining, by the processor, the parentidentifier and the child identifier from the database for thedisaggregation event; determining, by the processor and in a recursivemanner, additional identifiers from parent and child containmentrelationships; associating, by the processor, the disaggregation eventwith the additional identifiers; setting, by the processor, a state ofthe parent identifier to a condition reflecting error, in response tothe disaggregation event existing for a container associated with theparent identifier and the disaggregation event existing earlier than anaggregation event in an event sequence for the parent identifier;setting, by the processor, a state of the child identifier to indicate amissing commissioning event, in response to the child identifier beingan item and an event sequence of the child identifier beginning with thedisaggregation event; setting, by the processor, the state of the childidentifier to the condition reflecting error, in response to adecommissioning event existing earlier than the disaggregation event inthe event sequence of the child identifier; setting, by the processor,the state of the child identifier to the condition reflecting error, inresponse to the child identifier being the container, the containerbeing not reusable, the child identifier appears as a parent identifierearlier than the disaggregation event in the event sequence of the childidentifier, and no aggregation event exists earlier than thedisaggregation event in the event sequence of the child identifier. 2.The method of claim 1, further comprising initiating, by the processor,the event sequence for the parent identifier, in response to the eventsequence not previously existing for the parent identifier.
 3. Themethod of claim 1, further comprising setting, by the processor, thestate of the child identifier to the condition reflecting error, inresponse to at least one of: the child identifier is a child in anearlier aggregation event and more than one aggregation event or noaggregation event exists earlier than the disaggregation event in theevent sequence of the child identifier; the child identifier is an itemand more than one commissioning event or no commissioning event existsearlier than the disaggregation event in the event sequence of the childidentifier; or the child identifier is the container, the container isnot reusable, and more than one commissioning event earlier than thedisaggregation event in the event sequence of the child identifier. 4.The method of claim 1, wherein the decommissioning event includes atleast one of a state or change of the state associated with the item. 5.The method of claim 1, wherein the decommissioning event includesidentifying at least one of the item that is sellable, a containerassociated with the item or disaggregation hierarchies for the item. 6.The method of claim 1, further comprising receiving the decommissioningevent issued in response to at least one of destruction of an unconsumeditem, an expired item, a damaged item, a recalled item, an item beingdispensed, an item being consumed or an item being discarded.
 7. Themethod of claim 1, further comprising: determining, by the processor,whether the decommissioning event exists in the event for the item; andgenerating, by the processor, an error status for the item, in responseto the determination that no decommissioning event exists in the eventfor the item.
 8. The method of claim 1, further comprising: determining,by the processor, whether a plurality of decommissioning events exist inthe event for the item; and generating, by the processor, a suspectstatus for the item, in response to the determination that the pluralityof decommissioning events exists in the events for the item.
 9. Themethod of claim 1, further comprising: determining, by the processor,whether a receiving event exists in the event for the item; determining,by the processor, whether an associated shipping event exists for thereceiving event; and generating, by the processor, an error status forthe item, in response to the determination that there is not theassociated shipping event for the receiving event.
 10. The method ofclaim 1, further comprising: determining, by the processor, whether anyshipping events exist in the event for the item; determining, by theprocessor, whether an associated receiving event exists for each of theshipping events; and generating, by the processor, an error status forthe item, in response to the determination that there is not anassociated receiving event for at least one of the shipping events. 11.The method of claim 1, further comprising: identifying, by theprocessor, one or more contiguous chains of events within the eventsequence; matching, by the processor, one or more pairs of events;forming, by the processor, one or more trees of links from the matchedpairs of events; and identifying, by the processor, each tree as one ofthe contiguous chains of events.
 12. The method of claim 1, furthercomprising adding, by the processor and in response to a conditionreflecting error, a subset of the items associated with the parentidentifier to be commissioned at least one of on the production line, asa shipment is being packed, or by a wholesaler.
 13. The method of claim1, further comprising creating, by the processor, at least one of a newlink for related events or an unlinked event by utilizing a rulesengine.
 14. The method of claim 1, further comprising removing, by theprocessor and in response to the condition reflecting error, a subset ofthe items associated with the parent identifier.
 15. The method of claim1, further comprising: receiving, by the processor, a set of customrules from an entity in the supply chain; and assessing, by theprocessor, the receiving event by utilizing the set of custom rules. 16.The method of claim 1, further comprising: reading, by the processor, aplurality of stored parameters from an entity in the supply chain;creating, by the processor, a set of custom rules for the entity; andassessing, by the processor, the receiving event by utilizing the set ofcustom rules.
 17. The method of claim 1, further comprising reporting,by the processor and in accordance with a rule, a new commissioningevent as suspect, in response to the item having a commissioning event,and no previous decommissioning associated with the item.