Item tracing with supply chain secrecy using RFID tags and an identity-based encryption scheme
First Claim
Patent Images
1. A method for tracing an item, the method comprising:
- encrypting item information using an identity-based encryption scheme with a batch number for an item as a private encryption key; and
communicating the encrypted item information for storage on a radio frequency identification (RFID) tag for attachment to the item, wherein;
the RFID tag includes multiple different pieces of encrypted item information from multiple different producers, wherein each of the producers uses their own batch number as a private encryption key to encrypt the item information using the identity-based encryption scheme, andeach of the multiple different pieces of encrypted item information is independently accessible and decryptable.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for tracing an item may include encrypting item information using an identity-based encryption scheme with a batch number for an item as an encryption key and communicating the encrypted item information for storage on a radio frequency identification (RFID) tag for attachment to the item.
15 Citations
18 Claims
-
1. A method for tracing an item, the method comprising:
-
encrypting item information using an identity-based encryption scheme with a batch number for an item as a private encryption key; and communicating the encrypted item information for storage on a radio frequency identification (RFID) tag for attachment to the item, wherein; the RFID tag includes multiple different pieces of encrypted item information from multiple different producers, wherein each of the producers uses their own batch number as a private encryption key to encrypt the item information using the identity-based encryption scheme, and each of the multiple different pieces of encrypted item information is independently accessible and decryptable. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for re-encrypting item information, the method comprising:
-
receiving encrypted item information; re-encrypting the encrypted item information using an identity-based encryption scheme to re-randomize the encrypted item information; communicating the re-encrypted item information for storage on a radio frequency identification (RFID) tag; encrypting new item information using the identity-based encryption scheme with a batch number for a new item as a private encryption key; and communicating the encrypted new item information to the RFID tag. - View Dependent Claims (10, 11, 12)
-
-
13. A radio frequency identification (RFID) tag, comprising:
-
a receiver module that is arranged and configured to receive multiple different pieces of encrypted item information from multiple different producers, wherein each of the producers uses their own batch number as a private encryption key to encrypt the item information; and a storage module that is arranged and configured to store the multiple different pieces of encrypted item information, wherein each of the multiple different pieces of encrypted item information is independently accessible and decryptable. - View Dependent Claims (14, 15, 16)
-
-
17. A computer program product for encrypting item information, the computer program product being tangibly embodied on a non-transitory computer-readable medium and including executable code that, when executed, is configured to cause at least one data processing apparatus to execute an encryption module, the encryption module configured to:
-
encrypt item information using an identity-based encryption scheme with a batch number for an item as a private encryption key; and communicate the encrypted item information for storage on a radio frequency identification (RFID) tag for attachment to the item, wherein; the RFID tag includes multiple different pieces of encrypted item information from multiple different producers, wherein each of the producers uses their own batch number as a private encryption key to encrypt the item information using the identity-based encryption scheme, and each of the multiple different pieces of encrypted item information is independently accessible and decryptable. - View Dependent Claims (18)
-
Specification