Secure sharing of data along supply chains
First Claim
1. A computer-implemented method of sharing data in a supply chain, the data corresponding to an item having a tag associated therewith, the method comprising:
- generating data comprising historical data associated with the item, the historical data being accumulated and passed on from partner to partner in the supply chain;
generating a data reference;
encrypting the data using an encryption key to provide encrypted data;
transmitting the encrypted data over a network for storage at a location in a database based on the data reference;
writing the data reference and the encryption key to the tag, the encrypted data being absent from the tag; and
transferring the item to a successor in the supply chain.
2 Assignments
0 Petitions
Accused Products
Abstract
Implementations of methods of sharing data in a supply chain, the data corresponding to an item having a tag associated therewith, include generating data corresponding to the item, generating a data reference, encrypting the data using an encryption key to provide encrypted data, transmitting the encrypted data over a network for storage in a database based on the data reference, writing the data reference and the encryption key to the tag, and transferring the item to a successor in the supply chain. Implementations include retrieving information electronically stored on the tag, the information comprising a data reference and an encryption key, transmitting a data request over a network for retrieving encrypted data from a database, the data request comprising the data reference, receiving the encrypted data from the database, and decrypting the encrypted data using the encryption key to provide decrypted data.
-
Citations
18 Claims
-
1. A computer-implemented method of sharing data in a supply chain, the data corresponding to an item having a tag associated therewith, the method comprising:
-
generating data comprising historical data associated with the item, the historical data being accumulated and passed on from partner to partner in the supply chain; generating a data reference; encrypting the data using an encryption key to provide encrypted data; transmitting the encrypted data over a network for storage at a location in a database based on the data reference; writing the data reference and the encryption key to the tag, the encrypted data being absent from the tag; and transferring the item to a successor in the supply chain. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method of sharing data in a supply chain, the data corresponding to an item having a tag associated therewith, the method comprising:
-
retrieving information electronically stored on the tag, the information comprising a data reference and an encryption key; transmitting a data request over a network for retrieving encrypted data from a database, the data request comprising the data reference; receiving the encrypted data from the database, the encrypted data being absent from the tag and comprising historical data associated with the item, the historical data being accumulated and passed on from partner to partner in the supply chain; and decrypting the encrypted data using the encryption key to provide decrypted data. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable storage medium coupled to one or more processors having instructions stored thereon which, when executed by the one or more processors, cause the one or more processors to perform operations for sharing data in a supply chain, the data corresponding to an item having a tag associated therewith, the operations comprising:
-
retrieving information electronically stored on the tag, the information comprising a data reference and an encryption key; transmitting a data request over a network for retrieving encrypted data from a database, the data request comprising the data reference; receiving the encrypted data from the database, the encrypted data being absent from the tag and comprising historical data associated with the item, the historical data being accumulated and passed on from partner to partner in the supply chain; and decrypting the encrypted data using the encryption key to provide decrypted data. - View Dependent Claims (18)
-
Specification