×

Techniques for securing supply chain electronic transactions

  • US 9,306,750 B2
  • Filed: 07/16/2009
  • Issued: 04/05/2016
  • Est. Priority Date: 07/16/2009
  • Status: Active Grant
First Claim
Patent Images

1. A computer readable storage device storing a plurality of instructions which, when executed by a processor, cause the processor to authenticate an identity of a party to a transaction in a supply chain by:

  • registering, by a hub registry system, one or more reader devices at each of a plurality of points along the supply chain, each reader device registered by a network address of the reader device and associated with a public encryption key and a private encryption key;

    receiving, by the hub registry system, a first encrypted transaction data for a shipment of goods from a reader device registered by a shipper of the goods, the shipper comprising a first point of a plurality of points along the supply chain, the first encrypted transaction data identifying the goods being shipped and the shipper of the goods, the first encrypted transaction data being encrypted using the private encryption key associated with the reader device registered by the shipper and associated with the shipper by the hub registry system;

    decrypting, by the hub registry system, the first encrypted transaction data using a public encryption key associated with the registered network address of the reader device registered by the shipper of the goods to authenticate the sender of the goods;

    storing, by the hub registry system, the decrypted transaction data in an audit history for the transaction, the audit history providing a chain of custody for the shipment of goods and comprising information tracking the progress of goods between the plurality of points along the supply chain;

    receiving, by the hub registry system, a second encrypted transaction data from a reader device registered to a receiver of the goods, the receiver comprising a second point of the plurality of points along the supply chain, the second encrypted transaction data being encrypted using the private encryption key associated with the reader device registered by the receiver of the goods and associated with the receiver of the goods by the hub registry system, wherein the second encrypted transaction data includes the first encrypted transaction data from the shipper of the goods and additional information identifying the goods being received and the receiver of the goods;

    decrypting, by the hub registry system, the second encrypted transaction data using a public encryption key associated with the registered network address of the reader device registered by the receiver of the goods to authenticate the receiver of the goods;

    updating, by the hub registry system, the audit history for the transaction with the decrypted transaction data;

    rejecting, by the hub registry system, the transaction if authentication of one or more of the sender or the receiver of the goods failed; and

    providing, by the hub registry system, the audit history to the shipper and the receiver.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×