TECHNIQUES FOR SECURING SUPPLY CHAIN ELECTRONIC TRANSACTIONS
First Claim
1. A computer-readable storage device storing a plurality of instructions which, when executed by one or more processors, cause the one or more processors perform operations comprising:
- registering, by a hub registry system, one or more reader devices at each of a plurality of points along a supply chain, each reader device registered by a network address of the reader device and associated with a public encryption key and a private encryption key;
decrypting, by the hub registry system, first encrypted transaction data using a public encryption key associated with a registered network address of a reader device registered by a shipper of goods to authenticate a sender of the goods; and
decrypting, by the hub registry system, second encrypted transaction data using a public encryption key associated with a registered network address of a reader device registered by a receiver of the goods to authenticate the receiver of the goods.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for authenticating the identity of shippers and receivers of goods at each point along a supply chain. A central hub repository issues shippers and receivers a pair of public and private keys for encrypting communications between the shippers and receivers and the hub repository and for authenticating the identity of shippers and receivers. The hub repository may also maintain a log of all transactions between shippers and receivers to provide an audit trail that may be used to track the progress of goods along a supply chain.
-
Citations
20 Claims
-
1. A computer-readable storage device storing a plurality of instructions which, when executed by one or more processors, cause the one or more processors perform operations comprising:
-
registering, by a hub registry system, one or more reader devices at each of a plurality of points along a supply chain, each reader device registered by a network address of the reader device and associated with a public encryption key and a private encryption key; decrypting, by the hub registry system, first encrypted transaction data using a public encryption key associated with a registered network address of a reader device registered by a shipper of goods to authenticate a sender of the goods; and decrypting, by the hub registry system, second encrypted transaction data using a public encryption key associated with a registered network address of a reader device registered by a receiver of the goods to authenticate the receiver of the goods. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification