SYSTEMS AND METHODS FOR IMPLEMENTING SUPPLY CHAIN VISIBILITY POLICIES
First Claim
1. A method for implementing visibility policies within a supply chain that includes a plurality of partners, comprising:
- storing event data on a computer-readable storage medium of a first partner, the event data corresponding to at least one event associated with an item while the item was in possession of the first partner, the item having traveled through the supply chain;
transferring evidence of possession of the item between the plurality of partners as the item travels through the supply chain;
requesting access to the event data by a second partner;
determining that the item traveled through a portion of the supply chain associated with at least the first partner and the second partner, based on the evidence;
authenticating an identity of the second partner; and
authorizing the second partner to access the first event data from the computer-readable storage medium, when determining that the item traveled through the portion of the supply chain and when the identity of the second party is authenticated.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, storage medium and systems for implementing visibility policies within a supply chain include storing event data on a computer-readable storage medium of a first partner, the event data corresponding to at least one event associated with an item while the item was in possession of the first partner, the item having traveled through the supply chain, transferring evidence of possession between the plurality of partners as the item travels through the supply chain, and requesting access to the event data by a second partner. Implementations further include determining that the item traveled through a portion of the supply chain based on the evidence, authenticating an identity of the second partner, and authorizing the second partner to access the first event data, when it is determined that the item traveled through the portion of the supply chain and when the identity of the second party is authenticated.
-
Citations
20 Claims
-
1. A method for implementing visibility policies within a supply chain that includes a plurality of partners, comprising:
-
storing event data on a computer-readable storage medium of a first partner, the event data corresponding to at least one event associated with an item while the item was in possession of the first partner, the item having traveled through the supply chain; transferring evidence of possession of the item between the plurality of partners as the item travels through the supply chain; requesting access to the event data by a second partner; determining that the item traveled through a portion of the supply chain associated with at least the first partner and the second partner, based on the evidence; authenticating an identity of the second partner; and authorizing the second partner to access the first event data from the computer-readable storage medium, when determining that the item traveled through the portion of the supply chain and when the identity of the second party is authenticated. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-readable storage medium coupled to one or more processors and having instructions stored thereon which, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
-
storing event data on a computer-readable storage medium of a first partner, the event data corresponding to at least one event associated with an item while the item was in possession of the first partner, the item having traveled through the supply chain; transferring evidence of possession of the item between the plurality of partners as the item travels through the supply chain; requesting access to the event data by a second partner; determining that the item traveled through a portion of the supply chain associated with at least the first partner and the second partner, based on the evidence; authenticating an identity of the second partner; and authorizing the second partner to access the first event data from the computer-readable storage medium, when determining that the item traveled through the portion of the supply chain and when the identity of the second party is authenticated. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system for implementing visibility policies within a supply chain that includes a plurality of partners, comprising:
-
one or more processors; and a computer-readable storage medium coupled to the one or more processors having instructions stored thereon which, when executed by the one or more processors, cause the one or more processors to perform operations comprising; storing event data on a computer-readable storage medium of a first partner, the event data corresponding to at least one event associated with an item while the item was in possession of the first partner, the item having traveled through the supply chain; transferring evidence of possession between the plurality of partners as the item travels through the supply chain; requesting access to the event data by a second partner; determining that the item traveled through a portion of the supply chain associated with at least the first partner and the second partner, based on the evidence; authenticating an identity of the second partner; and authorizing the second partner to access the first event data from the computer-readable storage medium, when it is determined that the item traveled through the portion of the supply chain and when the identity of the second party is authenticated. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification