摘要:
In one embodiment of the present invention, a source point in a supply chain generates a secret and devises a secret sharing scheme that parcels the secret into a number of secret shares. The source point retains at least one secret share, and distributes the remaining secret shares to trusted, intermediate points in the supply chain. The source point then ships a shipment comprising are least one object, and frequently including at least one level of packaging, to a destination point in the supply chain, labeling the object or objects and/or packaging enclosing the object or objects with the retained secret share. Each intermediate point incorporates the secret share obtained by the intermediate point from the source point into the object, packaging enclosing the object, or a label on the object or packaging. At the destination point, the recipient of the object can use the secret shares incorporated into the object, packaging enclosing the object, or a label on the object or packaging to reconstruct the secret initially generated by the source point, and compares the reconstructed secret to the original secret forwarded from the source point.
摘要:
In a method of authenticating a package, an origin noise level of the package is determined based upon one or more identifying characteristics, where the origin noise level is a deviation from a normal condition caused by the one or more identifying characteristics. In addition, the package is authenticated based upon the origin noise level of the package.
摘要:
In one embodiment of the present invention, a source point, or security management entity, within a supply chain labels a shipment to be shipped through the supply chain with numbers, text strings, or other type of label information. Different label information may be placed at each of multiple levels of packaging as well as on objects within the packaging. The source point devises an encryption-key chain via a one-way function, and encrypts combinations of the label information incorporated within the packaging and objects using encryption keys from the encryption-key chain to produce one or more encrypted label tags. The one or more encrypted label tags are affixed to the shipment by the source point, and the shipment is sent into the supply chain for eventual delivery to a destination point. At pre-selected intervals of time, the source point reveals encryption keys within the encryption-key chain. In one embodiment of the present invention, revealing of encryption keys allows intermediate points or the destination point in the supply chain at which the shipment resides to extract label information and apply the most recently revealed encryption key to compute a label-tag value, and to then compare the computed label-tag value to a label tag affixed to, or incorporated within, the shipment.
摘要:
Information from a package is read. An encryption key is generated from the information read from the package. A text unit is encrypted using the encryption key. The encrypted text unit is affixed to the package.
摘要:
A package identifier for a package having at least one sub-package is generated. A package identifier generating function is performed on at least one sub-package identifier of the at least one sub-package to generate the package identifier. In addition, the generated package identifier is stored for use in authentication.
摘要:
In one embodiment of the present invention, a source point in a supply chain generates a secret and devises a secret sharing scheme that parcels the secret into a number of secret shares. The source point retains at least one secret share, and distributes the remaining secret shares to trusted, intermediate points in the supply chain. The source point then ships a shipment comprising are least one object, and frequently including at least one level of packaging, to a destination point in the supply chain, labeling the object or objects and/or packaging enclosing the object or objects with the retained secret share. Each intermediate point incorporates the secret share obtained by the intermediate point from the source point into the object, packaging enclosing the object, or a label on the object or packaging. At the destination point, the recipient of the object can use the secret shares incorporated into the object, packaging enclosing the object, or a label on the object or packaging to reconstruct the secret initially generated by the source point, and compares the reconstructed secret to the original secret forwarded from the source point.
摘要:
A path-based identifier is provided. An entity identifier is generated at an entity of a supply chain and the entity identifier is based on a reliability of the entity of the supply chain at which the entity identifier is generated. In addition, an updated path-based identifier is stored based on a predetermined function, where the entity identifier is an input to the predetermined function.
摘要:
A path-based identifier is provided. An entity identifier is generated at an entity of a supply chain and the entity identifier is based on a reliability of the entity of the supply chain at which the entity identifier is generated. In addition, an updated path-based identifier is stored based on a predetermined function, where the entity identifier is an input to the predetermined function.
摘要:
In one embodiment of the present invention, a source point of a supply chain secures shipment of an object by devising an encryption key and encrypting a message using the encryption key to produce an encrypted message. A portion or portions of the encryption key and the encrypted message are included or incorporated within the object to be shipped, packaging surrounding the object, and/or labels affixed to the object or packaging, prior to shipping the object to a destination point within the supply chain. Upon receipt of the object from the supply chain, the destination point can extract the portion or portions of the encryption key and the encrypted message from the object, packaging surrounding the object, and/or labels affixed to the object or packaging, obtain the remaining portion of the encryption key directly from the source point, reassemble the encryption key, and decrypt the encrypted message to produce a computed message. The destination point can then obtain the original message from the source point and compare the original message to the decrypted message in order to determine whether or not the shipment is authentic.
摘要:
In one embodiment of the present invention, a source point, or security management entity, within a supply chain labels a shipment to be shipped through the supply chain with numbers, text strings, or other type of label information. Different label information may be placed at each of multiple levels of packaging as well as on objects within the packaging. The source point devises an encryption-key chain via a one-way function, and encrypts combinations of the label information incorporated within the packaging and objects using encryption keys from the encryption-key chain to produce one or more encrypted label tags. The one or more encrypted label tags are affixed to the shipment by the source point, and the shipment is sent into the supply chain for eventual delivery to a destination point. At pre-selected intervals of time, the source point reveals encryption keys within the encryption-key chain. In one embodiment of the present invention, revealing of encryption keys allows intermediate points or the destination point in the supply chain at which the shipment resides to extract label information and apply the most recently revealed encryption key to compute a label-tag value, and to then compare the computed label-tag value to a label tag affixed to, or incorporated within, the shipment.