摘要:
A path-based identifier is provided. An entity identifier is generated at an entity of a supply chain and the entity identifier is based on a reliability of the entity of the supply chain at which the entity identifier is generated. In addition, an updated path-based identifier is stored based on a predetermined function, where the entity identifier is an input to the predetermined function.
摘要:
A path-based identifier is provided. An entity identifier is generated at an entity of a supply chain and the entity identifier is based on a reliability of the entity of the supply chain at which the entity identifier is generated. In addition, an updated path-based identifier is stored based on a predetermined function, where the entity identifier is an input to the predetermined function.
摘要:
Aspects of the present invention describe a method of tracking an item, comprising. The items is associated with a tag and capable of responding to a query from a tag reader and tag combination. The tag reader and tag combination capable of identifying the item associated with the tag using a tag reader. In operation, a tag reader makes a request to at least one tag reader and tag combination for the identity of an item associated with a tag. The tag reader and tag combination identifies the item associated with the tag and provides the identity of the item and tag to the tag reader.
摘要:
A seal for a package includes a circuit having electrical characteristics that change under mechanical deformation and an attaching material coupled to the circuit and for attaching the circuit to the package. The seal is attached to the package and processed prior to shipping to establish an untampered state for the seal. This includes identifying a circuit on the sealed package according to a seal type associated with the seal, recording one or more characteristics associated with the circuit from the seal and storing the seal type and one or more characteristics associated with the circuit from the seal for later comparison. To detect tampering to the package, the seal type and corresponding seal and circuit for the seal is identified, the characteristics associated with a circuit from the seal are determined and compared with the previous characteristics recorded when the seal was initially applied to the package. If the comparison indicates that a mechanical deformation of the seal occurred, it is possible the seal and package were tampered with during shipment or delivery.
摘要:
An indicating device configured to indicate that a package has been opened includes a voltage generator configured to convert a mechanical stress caused by opening of the package into a voltage and a circuit configured to employ the voltage to create a package opened indicator. The device also includes a data storage device configured to store the package opened indicator as electronic data.
摘要:
Aspects of the present invention describe a method of introducing items into a distribution network. Before entering items into the distribution network, the item is placed in an identifiable packaging that has an identifier. The identifier associated with the item and packaging is stored in an item identifier database and then the item is distributed into the distribution network. Another aspect of the present invention includes the identification and authentication of the items received from the distribution network. These operations include first receiving the item and corresponding identifier from the distribution network. The identifier associated with the item is read and then cross referenced with the item identifier database. A determination is made whether the identifier associated with the received item matches an entry in item identifier database or not. The item is indicated as authentic when the identifier matches the entry in the item identifier database.
摘要:
In one embodiment of the present invention, a source point in a supply chain generates a secret and devises a secret sharing scheme that parcels the secret into a number of secret shares. The source point retains at least one secret share, and distributes the remaining secret shares to trusted, intermediate points in the supply chain. The source point then ships a shipment comprising are least one object, and frequently including at least one level of packaging, to a destination point in the supply chain, labeling the object or objects and/or packaging enclosing the object or objects with the retained secret share. Each intermediate point incorporates the secret share obtained by the intermediate point from the source point into the object, packaging enclosing the object, or a label on the object or packaging. At the destination point, the recipient of the object can use the secret shares incorporated into the object, packaging enclosing the object, or a label on the object or packaging to reconstruct the secret initially generated by the source point, and compares the reconstructed secret to the original secret forwarded from the source point.
摘要:
Information from a package is read. An encryption key is generated from the information read from the package. A text unit is encrypted using the encryption key. The encrypted text unit is affixed to the package.
摘要:
A package identifier for a package having at least one sub-package is generated. A package identifier generating function is performed on at least one sub-package identifier of the at least one sub-package to generate the package identifier. In addition, the generated package identifier is stored for use in authentication.
摘要:
In one embodiment of the present invention, a source point in a supply chain generates a secret and devises a secret sharing scheme that parcels the secret into a number of secret shares. The source point retains at least one secret share, and distributes the remaining secret shares to trusted, intermediate points in the supply chain. The source point then ships a shipment comprising are least one object, and frequently including at least one level of packaging, to a destination point in the supply chain, labeling the object or objects and/or packaging enclosing the object or objects with the retained secret share. Each intermediate point incorporates the secret share obtained by the intermediate point from the source point into the object, packaging enclosing the object, or a label on the object or packaging. At the destination point, the recipient of the object can use the secret shares incorporated into the object, packaging enclosing the object, or a label on the object or packaging to reconstruct the secret initially generated by the source point, and compares the reconstructed secret to the original secret forwarded from the source point.