Secure sharing of item level data in the cloud
First Claim
1. A computer-implemented method of sharing data in a supply chain, the data corresponding to an item having a tag associated therewith, the method comprising:
- determining, by one or more processors, a random number from the tag, the random number being unique to the item;
selecting, by the one or more processors, a first integer and a second integer from a multiplicative group of prime integers;
generating, by the one or more processors, a first public key based on the first integer and a first key based on the second integer;
generating, by the one or more processors, an identifier based on the first public key and the random number, the identifier being used to locate and identify encrypted data associated with the tag within a central repository of the supply chain;
generating, by the one or more processors, a second key based on the first key and the random number;
encrypting, by the one or more processors, the data using the second key to provide the encrypted data;
transmitting, by the one or more processors, a tuple over a network; and
storing the transmitted tuple in the central repository, the central repository comprising a persistent storage device, and the tuple comprising the identifier and the encrypted data and being absent from the tag.
1 Assignment
0 Petitions
Accused Products
Abstract
Implementations of the present disclosure are directed to sharing data in a supply chain, the data corresponding to an item having a tag associated therewith. Methods include determining a random number from the tag, the random number being unique to the item, selecting a first integer and a second integer, generating a first public key based on the first integer and a semi-public key based on the second integer, generating an identifier based on the first public key and the random number, generating a key based on the semi-public key and the random number, encrypting the data using the key to provide encrypted data, defining a tuple comprising the identifier and the encrypted data, and transmitting the tuple over a network for storage in a persistent storage device.
50 Citations
17 Claims
-
1. A computer-implemented method of sharing data in a supply chain, the data corresponding to an item having a tag associated therewith, the method comprising:
-
determining, by one or more processors, a random number from the tag, the random number being unique to the item; selecting, by the one or more processors, a first integer and a second integer from a multiplicative group of prime integers; generating, by the one or more processors, a first public key based on the first integer and a first key based on the second integer; generating, by the one or more processors, an identifier based on the first public key and the random number, the identifier being used to locate and identify encrypted data associated with the tag within a central repository of the supply chain; generating, by the one or more processors, a second key based on the first key and the random number; encrypting, by the one or more processors, the data using the second key to provide the encrypted data; transmitting, by the one or more processors, a tuple over a network; and storing the transmitted tuple in the central repository, the central repository comprising a persistent storage device, and the tuple comprising the identifier and the encrypted data and being absent from the tag. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method of sharing data in a supply chain, the data corresponding to an item having a tag associated therewith, the method comprising:
-
receiving, by one or more processors, at least one of a first key and a second key from a second party; identifying, by the one or more processors, a public key associated with the second party based on the first key and the second key; generating, by the one or more processors, a query based on a random number, the random number being unique to the item; transmitting, by the one or more processors, the query over a network to a third party; receiving, by the one or more processors, from the third party, one or more tuples identified by the third party based on the query, each tuple of the one or more tuples being absent from the tag and comprising respective encrypted data; and decrypting, by the one or more processors, the encrypted data based on at least one of the first key and the second key. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A non-transitory computer-readable storage medium coupled to one or more processors having instructions stored thereon which, when executed by the one or more processors, cause the one or more processors to perform operations for sharing data in a supply chain, the data corresponding to an item having a tag associated therewith, the operations comprising:
-
determining a random number from the tag, the random number being unique to the item; selecting a first integer and a second integer from a multiplicative group of prime integers; generating a first public key based on the first integer and a first key based on the second integer; generating an identifier based on the first public key and the random number, the identifier being used to locate and identify encrypted data associated with the tag within a central repository of the supply chain; generating a second key based on the first key and the random number; encrypting the data using the second key to provide the encrypted data; transmitting a tuple over a network; and storing the transmitted tuple in the central repository, the central repository comprising a persistent storage device, and the tuple comprising the identifier and the encrypted data and being absent from the tag.
-
-
17. A system for sharing data in a supply chain, the data corresponding to an item having a tag associated therewith, the system comprising:
-
one or more computers; and a non-transitory computer-readable medium coupled to the one or more computers having instructions stored thereon which, when executed by the one or more computers, cause the one or more computers to perform operations comprising; determining a random number from the tag, the random number being unique to the item; selecting from a multiplicative group of prime integers, a first integer and a second integer; generating a first public key based on the first integer and a first key based on the second integer; generating an identifier based on the first public key and the random number, the identifier being used to locate and identify encrypted data associated to the tag within a central repository of the supply chain; generating a second key based on the first key and the random number; encrypting the data using the second key to provide the encrypted data; and transmitting a tuple over a network; storing the transmitted tuple in the central repository, the central repository comprising a persistent storage device, and the tuple comprising the identifier and the encrypted data and being absent from the tag.
-
Specification