Secure sharing of data along supply chains

作者: Benjamin Bolland , Christian Loës , Leonardo Weiss F. Chaves , Hannes Thies , Pascal Wichmann

DOI:

关键词: DatabaseSupply chainData requestImplementationComputer scienceEncryptionFilesystem-level encryptionOn-the-fly encryptionBus encryptionClient-side encryption

摘要: Implementations of methods sharing data in a supply chain, the corresponding to an item having tag associated therewith, include generating item, reference, encrypting using encryption key provide encrypted data, transmitting over network for storage database based on writing reference and tag, transferring successor chain. retrieving information electronically stored comprising key, request from database, receiving decrypting decrypted data.

参考文章(55)
David S. Bonalle, Peter D. Saunders, Brian Barnes, Method and system for tracking user performance ,(2008)
Basel Alomair, Andrew Clark, Jorge Cuellar, Radha Poovendran, Scalable RFID systems: a privacy-preserving protocol with constant-time identification dependable systems and networks. pp. 1- 10 ,(2010) , 10.1109/DSN.2010.5545008
Jonathan Burchell, Gary A. Pope, Stanton Kaye, Therese E. Myers, Shelf-life monitoring sensor-transponder system ,(2005)
Yunhao Liu, Jinsong Han, Li Lu, RFID privacy-preserving authentication system and method ,(2009)
Antoon Marie Henrie Tombeur, Geert Jan Schrijen, Boris Skoric, Stefan Maubach, Pim Theo Tuyls, Transponder system for transmitting key-encrypted information and associated keys ,(2006)