Techniques for securing supply chain electronic transactions
First Claim
Patent Images
1. A computer-readable storage device storing a plurality of instructions which, when executed by one or more processors, cause the one or more processors perform operations comprising:
- transmitting, by a hub registry system, a first private key to a first device, the first device being one of a plurality of devices along a supply chain, the first private key being encrypted;
transmitting, by the hub registry system, a second private key to a second device, the second device being one of the plurality of devices along the supply chain, and the second private key being encrypted;
receiving, by the hub registry system, first encrypted transaction data, the first encrypted transaction data being encrypted with the first private key;
decrypting, by the hub registry system, the first encrypted transaction data using a first public key associated with the first device to authenticate a sender of goods;
storing, by the hub registry system, in an audit history for a chain of custody of the goods, at least part of the decrypted first encrypted transaction data;
receiving, by the hub registry system, second encrypted transaction data, the second encrypted transaction data comprising the first encrypted transaction data being further encrypted with the second private key;
decrypting, by the hub registry system, the second encrypted transaction data using a second public encryption key associated with the second device and the first public key associated with the first device to authenticate a receiver of the goods; and
storing, by the hub registry system, in the audit history for the chain of custody of the goods, at least part of the decrypted second encrypted transaction data.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for authenticating the identity of shippers and receivers of goods at each point along a supply chain. A central hub repository issues shippers and receivers a pair of public and private keys for encrypting communications between the shippers and receivers and the hub repository and for authenticating the identity of shippers and receivers. The hub repository may also maintain a log of all transactions between shippers and receivers to provide an audit trail that may be used to track the progress of goods along a supply chain.
58 Citations
20 Claims
-
1. A computer-readable storage device storing a plurality of instructions which, when executed by one or more processors, cause the one or more processors perform operations comprising:
-
transmitting, by a hub registry system, a first private key to a first device, the first device being one of a plurality of devices along a supply chain, the first private key being encrypted; transmitting, by the hub registry system, a second private key to a second device, the second device being one of the plurality of devices along the supply chain, and the second private key being encrypted; receiving, by the hub registry system, first encrypted transaction data, the first encrypted transaction data being encrypted with the first private key; decrypting, by the hub registry system, the first encrypted transaction data using a first public key associated with the first device to authenticate a sender of goods; storing, by the hub registry system, in an audit history for a chain of custody of the goods, at least part of the decrypted first encrypted transaction data; receiving, by the hub registry system, second encrypted transaction data, the second encrypted transaction data comprising the first encrypted transaction data being further encrypted with the second private key; decrypting, by the hub registry system, the second encrypted transaction data using a second public encryption key associated with the second device and the first public key associated with the first device to authenticate a receiver of the goods; and storing, by the hub registry system, in the audit history for the chain of custody of the goods, at least part of the decrypted second encrypted transaction data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer-implemented method comprising:
-
transmitting, by a hub registry system, a first private key to a first device, the first device being one of a plurality of devices along a supply chain, the first private key being encrypted; transmitting, by the hub registry system, a second private key to a second device, the second device being one of the plurality of devices along the supply chain, and the second private key being encrypted; receiving, by the hub registry system, first encrypted transaction data, the first encrypted transaction data being encrypted with the first private key; decrypting, by the hub registry system, the first encrypted transaction data using a first public key associated with the first device to authenticate a sender of goods; storing, by the hub registry system, in an audit history for a chain of custody of the goods, at least part of the decrypted first encrypted transaction data; receiving, by the hub registry system, second encrypted transaction data, the second encrypted transaction data comprising the first encrypted transaction data being further encrypted with the second private key; decrypting, by the hub registry system, the second encrypted transaction data using a second public encryption key associated with the second device and the first public key associated with the first device to authenticate a receiver of the goods; and storing, by the hub registry system, in the audit history for the chain of custody of the goods, at least part of the decrypted second encrypted transaction data.
-
-
20. A system comprising:
-
one or more processors; and a memory coupled with the one or more processors, the memory configured to store instructions that when executed by the one or more processors cause the one or more processors to; transmit a first private key to a first device, the first device being one of a plurality of devices along a supply chain, the first private key being encrypted; transmit a second private key to a second device, the second device being one of the plurality of devices along the supply chain, and the second private key being encrypted; receive first encrypted transaction data, the first encrypted transaction data being encrypted with the first private key associated with a first device; decrypt the first encrypted transaction data using a first public key associated with the first to authenticate a sender of goods;
store in an audit history for a chain of custody of the goods, at least part of the decrypted first encrypted transaction data;receive second encrypted transaction data, the second encrypted transaction data comprising the first encrypted transaction data being further encrypted with the second private key associated with a second device; decrypt the second encrypted transaction data using a second public encryption key associated with the second device and the first public key associated with the first device to authenticate a receiver of the goods; and store in the audit history for the chain of custody of the goods, at least part of the decrypted second encrypted transaction data.
-
Specification