Three protocols for securing the data pipeline of the international supply chain