Exploring Blockchain in Healthcare: Implementation and Impact of Distributed Database Across Pharmaceutical Supply Chain, Drugs Administration, Healthcare Insurance and Patient Administration by Anurag Srivastava
Author:Anurag Srivastava [Srivastava, Anurag]
Language: eng
Format: epub
Publisher: BPB Publications
Published: 2022-08-15T00:00:00+00:00
Blockchain-based pharmaceutical supply chain workflow
Figure 5.5 depicts the general workflow of a Blockchain-based pharmaceutical supply chain:
Figure 5.5: Blockchain-based pharmaceutical SCM workflow
Let's see how different players in the ecosystem interact with each other through a common layer of the Blockchain network:
Once the manufacture invents a new drug after R&D and clinical trials, a block is created and information is recorded into the Blockchain network. This information will be available in real-time; information regarding is available in the network even for products that have already been developed.
After the clinical trial, the sample is sent to the manufacturing unit for mass production. The manufacturer sends a purchase order to the raw material supplier through a private node, and the same request is logged in the Blockchain network.
The supplier is notified of the new PO, and the supplier accepts the request and logs the information in the network through a private node. Payment and settlement are done between supplier and manufacturer based on the smart contract terms and conditions. All the requests, responses, and other information are maintained in the Blockchain network.
The raw material is stored in the warehouse once it is received at the manufacturing facility, and all the input parameters are measured, and the relevant information is pushed in the Blockchain network. Subsequently, after production, the end product/drug is sent for packaging and stored in the warehouse for distribution. The product's information like identifier, barcode, expiry date, batch no, manufacturer date, and other important parameters are pushed in the Blockchain network.
Wholesale distributors raise a request with the manufacturer through a private node, and the manufacture sends the consignment along with transportation information, consignment no, agent's information, and other information. All information logs into the Blockchain network.
Distributors store the product in the warehouse in a large volume and transport the product to the providers like hospitals, clinics, and pharmacies. These providers can access the specific productâs data from the Blockchain and authenticate the product before selling it to the end consumer through the Blockchain network. This product authentication helps fight counterfeit supplies.
Patients purchase the drugs from the providers and consume them. They can check the authenticity of the end product by providing an identifier to the Blockchain network. The Blockchain provides the complete journey of the product to the customer, and that's how customers can check the whole journey of the product, and determine whether it is safe to consume, or get any other information. Patients are encouraged to determine the authenticity throughout the whole process as the Blockchain supply chain offers transparent information for verification by potential buyers.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Optimizing Microsoft Azure Workloads by Rithin Skaria(6301)
Kubernetes in Production Best Practices by Aly Saleh and Murat Karslioglu(6033)
Cloud Computing Demystified for Aspiring Professionals by David Santana(5136)
Zed Attack Proxy Cookbook by Ryan Soper & Nestor N Torres & Ahmed Almoailu(4574)
Google Cloud for Developers: Write, migrate, and extend your code by leveraging Google Cloud by Hector Parra Martinez(3563)
Mastering Cyber Intelligence by Jean Nestor M. Dahj;(3281)
AWS Observability Handbook by Phani Kumar Lingamallu & Fabio Braga de Oliveira(3187)
The Road to Azure Cost Governance by Paola E. Annis Giuliano Caglio(2811)
Microsoft 365 Fundamentals Guide by Gustavo Moraes and Douglas Romão(2254)
Agile Security Operations: Engineering for Agility in Cyber Defense, Detection, and Response by Hinne Hettema(1777)
Cloud Identity Patterns and Strategies: Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory by Giuseppe Di Federico Fabrizio Barcaroli(1765)
Bootstrapping Service Mesh Implementations with Istio by Anand Rai(1662)
The Road to Azure Cost Governance: Techniques to tame your monthly Azure bill with a continuous optimization journey for your apps by Paola E. Annis Giuliano Caglio(1267)
Agile Security Operations: Engineering for agility in cyber defense, detection, and response by Hinne Hettema(1199)
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs by Ryan Soper Nestor N Torres Ahmed Almoailu(1193)
Linux Administration Best Practices: Practical Solutions to Approaching the Design and Management of Linux Systems by Scott Alan Miller(1135)
DevSecOps in Practice with VMware Tanzu: Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio by Parth Pandit Robert Hardt(1084)
Terraform for Google Cloud Essential Guide by Bernd Nordhausen(889)
Becoming KCNA Certified by Dmitry Galkin(873)
