×

Systems and methods for implementing supply chain visibility policies

  • US 9,159,046 B2
  • Filed: 06/29/2009
  • Issued: 10/13/2015
  • Est. Priority Date: 06/29/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method for implementing visibility policies within a supply chain that includes a plurality of partners, the method being performed by one or more processors and comprising:

  • storing, by the one or more processors, event data on a non-transitory computer-readable storage medium of a first partner, the event data corresponding to at least one event associated with an item while the item was in possession of the first partner;

    transferring, by the one or more processors, the item and a first proof of possession from the first partner to another partner in the supply chain;

    receiving, by the one or more processors, a request for access to the event data by a second partner in the supply chain, the request being received from the second partner and including a set of proofs of possession and a set of chaining tokens, the set of proofs of possession comprising a second proof of possession of the second partner and one or more proofs of possession of any intermediate partners between the first partner and the second partner in the supply chain, the set of chaining tokens comprising a first chaining token indicating that the second partner received the item in the supply chain, and at least two chaining tokens associated with any intermediate partners between the first partner and the second partner indicating that the intermediate partners received the item from and sent the item to specific partners in the supply chain, wherein at least one of the first proof of possession corresponding to the first partner and the second proof of possession corresponding to the second partner is provided as one of a signature-based proof of possession a shared secret proof of possession, a token-based proof of possession and a time-based proof of possession, an evidence comprising the proof of possession;

    determining, by the one or more processors, that the item traveled through a portion of the supply chain associated with at least the first partner and the second partner, based on the set of proofs of possession;

    authenticating, by the one or more processors, the identity of the second partner based on the set of chaining tokens and the set of proofs of possession; and

    authorizing, by the one or more processors, the second partner to access the first event data from the computer-readable storage medium of the first partner, in response to determining that the item traveled through the portion of the supply chain and the identity of the second party being authenticated.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×