PRIVACY PRESERVING ARTIFICIAL IMMUNE SYSTEM
First Claim
1. A computer-implemented method of identifying an anomalous product in a supply chain, the method comprising:
- maintaining a set of anomalous patterns of events of a product in the supply chain;
transmitting at least one of the anomalous patterns of events to nodes of the supply chain;
receiving messages from nodes that have received the at least one pattern at a third party, wherein the third party is not a node of the supply chain, the messages indicating whether or not the occurrence of an event of the product in the supply chain at the node matches an event in the anomalous pattern of events that has been transmitted to the node, wherein messages indicating that an event at the node matches an event in the anomalous pattern of events are securely encrypted by the node prior to transmission to the third party, wherein the encryption is based on a key that is unknown to the third party; and
determining, via at least one processor of the third party, that the product is an anomalous product, wherein the determination is based on the messages from nodes indicating that a sequence of events occurring at one or more nodes matches a sequence of events in the anomalous pattern of events.
2 Assignments
0 Petitions
Accused Products
Abstract
Identifying anomalous products in a supply chain includes maintaining a set of anomalous patterns of events products in the supply chain. At least one of the anomalous patterns of events is transmitted to nodes of the supply chain. Messages are received from nodes at a third party and indicate whether an event of the product in the supply chain at the node matches an event in the anomalous pattern of events that has been transmitted to the node. Messages indicating that an event at the node matches an event in the anomalous pattern of events are securely encrypted, based on a key that is unknown to the third party, prior to transmission to the third party. A determination is made whether the product is an anomalous product, based on the messages from nodes indicating that a sequence of events occurring at one or more nodes matches a sequence of events in the anomalous pattern of events.
-
Citations
20 Claims
-
1. A computer-implemented method of identifying an anomalous product in a supply chain, the method comprising:
-
maintaining a set of anomalous patterns of events of a product in the supply chain; transmitting at least one of the anomalous patterns of events to nodes of the supply chain; receiving messages from nodes that have received the at least one pattern at a third party, wherein the third party is not a node of the supply chain, the messages indicating whether or not the occurrence of an event of the product in the supply chain at the node matches an event in the anomalous pattern of events that has been transmitted to the node, wherein messages indicating that an event at the node matches an event in the anomalous pattern of events are securely encrypted by the node prior to transmission to the third party, wherein the encryption is based on a key that is unknown to the third party; and determining, via at least one processor of the third party, that the product is an anomalous product, wherein the determination is based on the messages from nodes indicating that a sequence of events occurring at one or more nodes matches a sequence of events in the anomalous pattern of events. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for identifying an anomalous product in a supply chain, the system comprising:
-
a memory storing a set of anomalous patterns of events of a product in the supply chain; a transmission engine configured for transmitting at least one of the anomalous patterns of events to nodes of the supply chain; a message handler configured for receiving messages from nodes that have received the at least one pattern, the messages indicating whether or not the occurrence of an event of the product in the supply chain at the node that sends a message matches an event in the anomalous pattern of events that has been transmitted to the node, wherein messages indicating that an event at the node matches an event in the anomalous pattern of events are securely encrypted prior to receipt by the message handler, wherein the encryption is based on a key that is unknown to the system; and a processor configured to determine that the product is an anomalous product, wherein the determination is based on the messages from nodes indicating that a sequence of events occurring at one or more nodes matches a sequence of events in the anomalous pattern of events. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A system for identifying an anomalous pattern of events in a network of nodes, the system comprising:
-
a memory storing a set of anomalous patterns of events in the network of nodes; a transmission engine configured for transmitting at least one of the anomalous patterns of events to nodes of the network of nodes; a message handler configured for receiving messages from each of the nodes at a third party that is not a node of the network, the messages indicating whether or not the occurrence of an events in the network at the node matches an event in the anomalous pattern that has been transmitted to the node, wherein messages indicating that an event at the node matches an event in the anomalous pattern of events are securely encrypted by the node prior to receipt by the message handler, wherein the encryption is based on a key that is unknown to the system, the messages received from a node including pairs of values, xγ
,δ
, δ
where; - View Dependent Claims (20)
-
Specification