Search

US-12619944-B2 - Enriching supply chain data

US12619944B2US 12619944 B2US12619944 B2US 12619944B2US-12619944-B2

Abstract

Examples described herein enrich supply chain data. According to an aspect, a computer-implemented method includes receiving, by a processing device, supply chain data and identifying, by the processing device, a party associated, via a supply chain, with an entity based at least in part on the supply chain data. The method also includes collecting, by the processing device, additional data about the party and analyzing, by the processing device, the additional data about the party to determine a potential disruption to the entity. The method further includes implementing, by the processing device, a corrective action to mitigate the potential disruption.

Inventors

  • Brandon Daniels
  • Skyler Chi
  • Jonathan Ganucheau

Assignees

  • Exiger Holdings, Inc.

Dates

Publication Date
20260505
Application Date
20240328

Claims (18)

  1. 1 . A computer-implemented method for enriching supply chain data, the method comprising: receiving, by a processing device, supply chain data from a plurality of data sources distributed across a network; identifying, by the processing device, a party associated, via a supply chain, with an entity based at least in part on the supply chain data, wherein the identifying is performed using a unique identifier of a plurality of unique identifiers for the entity and the unique identifier is selected using a priority-based selection that is determined to have a highest degree of confidence of being unique in a compressed storage format, wherein the unique identifier is a hash and is determined as part of a multi-phase process comprising a plurality of extract, transform, and load (ETL) phases, and wherein separate processing of entities having a source system identifier and missing the source system identifier is performed in one of the ETL phases prior to processing the unique identifier in a subsequent one of the ETL phases; creating, by the processing device, a data structure with the plurality of unique identifiers to link multiple source data sets from the data sources as normalized dynamic data streams; flowing, by the processing device, updates from the source data sets based on data feeds of the data sources to the data structure through inheritance properties such that the updates are available at a predetermined interval; collecting, by the processing device, additional data about the party; analyzing, by the processing device, the additional data about the party to determine a potential disruption to the entity; and implementing, by the processing device, a corrective action to mitigate the potential disruption.
  2. 2 . The computer-implemented method of claim 1 , wherein the additional data comprises commerce data relating to the party.
  3. 3 . The computer-implemented method of claim 2 , wherein the commerce data identifies one or more of: a port, a shipping container, a transport from the port to another port, contents of the shipping container, harmonized system code data, and company information about a shipper and a consignee.
  4. 4 . The computer-implemented method of claim 1 , wherein the additional data comprises cyber data relating to the party.
  5. 5 . The computer-implemented method of claim 4 , wherein the cyber data identifies software usage of the party.
  6. 6 . The computer-implemented method of claim 1 , wherein the hash is based at least in part on information about the entity.
  7. 7 . The computer-implemented method of claim 1 , wherein the hash is based at least in part on a uniform resource locator associated with the entity.
  8. 8 . The computer-implemented method of claim 1 , wherein the supply chain data is received from a plurality of sources.
  9. 9 . The computer-implemented method of claim 1 , wherein the corrective action is selected from a group consisting of selecting an alternative party and adjusting an operation of the entity.
  10. 10 . The computer-implemented method of claim 1 , wherein collecting the additional data about the party comprises crawling and scraping publicly available information associated with the party.
  11. 11 . A system comprising: a memory comprising computer readable instructions; and a processing device for executing the computer readable instructions, the computer readable instructions controlling the processing device to perform operations comprising: receiving supply chain data from a plurality of data sources distributed across a network; identifying a party associated, via a supply chain, with an entity based at least in part on the supply chain data, wherein the identifying is performed using a unique identifier of a plurality of unique identifiers for the entity and the unique identifier is selected using a priority-based selection that is determined to have a highest degree of confidence of being unique in a compressed storage format, wherein the unique identifier is a hash and is determined as part of a multi-phase process comprising a plurality of extract, transform, and load (ETL) phases, and wherein separate processing of entities having a source system identifier and missing the source system identifier is performed in one of the ETL phases prior to processing the unique identifier in a subsequent one of the ETL phases; creating a data structure with the plurality of unique identifiers to link multiple source data sets from the data sources as normalized dynamic data streams; flowing updates from the source data sets based on data feeds of the data sources to the data structure through inheritance properties such that the updates are available at a predetermined interval; collecting additional data about the party; analyzing the additional data about the party to determine a potential disruption to the entity; and implementing a corrective action to mitigate the potential disruption.
  12. 12 . The system of claim 11 , wherein the additional data comprises commerce data relating to the party.
  13. 13 . The system of claim 12 , wherein the commerce data identifies one or more of: a port, a shipping container, a transport from the port to another port, contents of the shipping container, harmonized system code data, and company information about a shipper and a consignee.
  14. 14 . The system of claim 11 , wherein the additional data comprises cyber data relating to the party and the cyber data identifies software usage of the party.
  15. 15 . The system of claim 11 , wherein the hash is based at least in part on information about the entity and/or the hash is based at least in part on a uniform resource locator associated with the entity.
  16. 16 . The system of claim 11 , wherein the supply chain data is received from a plurality of sources, and the corrective action is selected from a group consisting of selecting an alternative party and adjusting an operation of the entity.
  17. 17 . The system of claim 11 , wherein collecting the additional data about the party comprises crawling and scraping publicly available information associated with the party.
  18. 18 . A computer program product comprising a non-transitory computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to perform operations comprising: receiving supply chain data from a plurality of data sources distributed across a network; identifying a party associated, via a supply chain, with an entity based at least in part on the supply chain data, wherein the identifying is performed using a unique identifier of a plurality of unique identifiers for the entity and the unique identifier is selected using a priority-based selection that is determined to have a highest degree of confidence of being unique in a compressed storage format, wherein the unique identifier is a hash and is determined as part of a multi-phase process comprising a plurality of extract, transform, and load (ETL) phases, and wherein separate processing of entities having a source system identifier and missing the source system identifier is performed in one of the ETL phases prior to processing the unique identifier in a subsequent one of the ETL phases; creating a data structure with the plurality of unique identifiers to link multiple source data sets from the data sources as normalized dynamic data streams; flowing updates from the source data sets based on data feeds of the data sources to the data structure through inheritance properties such that the updates are available at a predetermined interval; collecting additional data about the party; analyzing the additional data about the party to determine a potential disruption to the entity; and implementing a corrective action to mitigate the potential disruption.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS This application claims priority to U.S. Provisional Patent Application No. 63/455,694, filed Mar. 30, 2023, the entire contents of which are specifically incorporated by reference herein. BACKGROUND This disclosure generally relates to network data discovery, and more particularly, to enriching supply chain data with complex relationships gathered across a computer network from a plurality of sources. A supply chain is a network of businesses, individuals, and activities that are involved in the creation and delivery of a product or service to an end customer. The process typically begins with the procurement of raw materials and ends with the delivery of a final product to the end customer. A supply chain can have multiple phases. During a planning phase, it is determined what products will be produced, an amount of materials needed, a time frame for production, an approach for the distribution of finished products, and/or the like. During a source phase, raw materials and components are acquired from suppliers/vendors. During a manufacturing phase, the raw materials and components are used to manufacture the final product. After manufacturing, the final product is transported to other locations, such as warehouses or distribution centers during a logistics phase. The final step in the supply chain process is a distribution phase, which involves delivering the finished product to the customer, which can be accomplished using various channels, such as retailers, wholesalers, or direct to the consumer. The logistics phase and the distribution phase can involve various transportation methods, such as truck transport, rail transport, ship transport, and/or the like, including combinations and/or multiples thereof. Throughout the supply chain process, there is a need for communication and coordination between different parties involved in the supply chain. This includes suppliers, manufacturers, logistics providers, transporters, and retailers. SUMMARY In one exemplary embodiment, a computer-implemented method for enriching supply chain data is provided. The method includes receiving, by a processing device, supply chain data and identifying, by the processing device, a party associated, via a supply chain, with an entity based at least in part on the supply chain data. The method also includes collecting, by the processing device, additional data about the party and analyzing, by the processing device, the additional data about the party to determine a potential disruption to the entity. The method further includes implementing, by the processing device, a corrective action to mitigate the potential disruption. In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include where the additional data includes commerce data relating to the party. In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include where the commerce data identifies one or more of: a port, a shipping container, a transport from the port to another port, contents of the shipping container, harmonized system code data, and company information about a shipper and a consignee. In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include where the additional data includes cyber data relating to the party. In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include where the cyber data identifies software usage of the party. In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include where the identifying is performed using a unique identifier for the entity. In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include where the unique identifier is a hash. In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include where the hash is based at least in part on information about the entity. In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include where the hash is based at least in part on a uniform resource locator associated with the entity. In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include where the supply chain data is received from a plurality of sources. In addition to one or more of the features described herein, or as an alternative, further embodiments of the method may include where the corrective action is selected from a group consisting of selecting an alternative party and adjusting an operation of the entity. In addition to one or more of the features described herein, or as