Does data of area piece catenary trace to the source whether solve the difficult problem that make a

One, does fokelore trace to the source mediumly what is the system?

1.What is to trace to the source system?

Does data of area piece catenary trace to the source whether solve the difficult problem that make a holiday?

What is but date from, baidu gave out to explain clearly on 100 divisions, but date from includes 2 approaches: Dog (Tracking) and date from (Tracing) . Dog those who point to is the product comes from the upper reaches that supplies chain downstream to current, follow a specific unit or the ability of a batch of product moving method. Date from is to point to a product from supply catenary to come downstream of upper reaches converse and current, identify a specific unit or a batch of ability of product source namely. Accordingly, we can be summed up trace to the source the system uses content couplet net, big data namely be good at body a whole system, make the product arrives from manufacturing process the information of current link is OK date from can be checked.

2.Why should build trace to the source system

So why should be we built trace to the source system, actually " trace to the source system " the earliest be answered 1997 by the European Union " mad ox is ill " the food safety with perfect work up runs a system. Build the earliest so trace to the source systematic purpose is to solve produce the food safety problem that wait, from fountainhead the quality problem that controls food.

Trace to the source system not only it is problem of date from fountainhead, still need to be on the move to article the process undertakes tracking, as be on the move the development of information, it is luxury, artwork, historic site, be on the move all right in the auction, all previous is tracked via what time evolves into the date from of true bogus or information; 2 it is the development as electric business, "Mountain fastness " , " fake " savage, commodity is in the date from problem of current link is gradually serious also rise, the commodity that how ensures consumer to buy the by shoddy happening that move packet of phenomenon, commodity is tracked mediumly in content shedding process also attach most importance to especially should.

3.Trace to the source systematic development

Trace to the source traditionally the system builds the superintendency at tripartite, simple for build one thing track a system, every commodity is corresponding an onefold encode, the user can carry encode district the platform of tripartite or the information archives that App inquires commodity, to produce trace to the source the system can track food from cultivate reap, pack, carry etc, trace to the source thoroughly the system still is met outspread the cultivates animal of environment, agriculture feed process to crop is waited a moment, store all information archives in exclusive encode, expressional form has a form code, 2 dimension code to wait, through sweeping a date from and the information that inquire produce.

To commodity prevent bogus to track, there is the sign that prevent bogus on a lot of commodity or superintend a code, consumer identifies the true bogus of the product through scanning test and verify. But these prevent bogus technology to cannot go up at all solve the problem that has making a holiday through duplicate and changing the label that prevent bogus.

4.Why to have the technology that prevent bogus to cannot go up at all solve the problem that make a holiday?

Trace to the source should grab from fountainhead:

Current, trace to the source main show is in systematic problem two respects, be in on one hand commodity is affixed before preventing pseudo code, how to distinguish the message of commodity? If be tracked from fountainhead, the growth that includes crop environment, the fertilization circumstance of crop rely on artificial record, not only credit problem also can produce in wasting time to register a process in this.

Next, prevent bogus form to had had a lot of now, include code of a form code, radio frequency identifying, 2 dimension to wait a moment, through all sorts of physics the method will prevent pseudo code to hide within commodity for instance, do not unseal cannot test and verify, or blow coating ability test and verify to wait, it is to prevent 2 dimension code to build the holiday. But the present technology that prevent bogus cannot from go up at all solve prevent pseudo code to be duplicated by the problem of pilfer.

Besides, the systematic platform that information is registered to be in a center to change, person of that possible presence revises the possibility of data for do evil, the hacker atttacks a problem, information cannot get ensuring, still facing trustful problem. Accordingly, how to solve trustful mechanism, the problem with how assure what the system is faced with to the safety of information cannot distort is to trace to the source the most serious.

2, area piece catenary traces to the source prevent bogus to run actually from what trustful problem solves on germ discuss:

Carry preceding part of the text we are knowable, trace to the source main pain spot of the system basically is trustful problem, accordingly, to solve trustful problem, can get on the information that track catenary, use itself of area piece catenary to possess information transparent, the characteristic that cannot distort solves trustful problem. But solve only on the information problem after catenary is insufficient still, how to let catenary leave this measure on catenary, just be real problem, assure to go up the information safety before catenary just is core. Range estimation of one billion four hundred and ten million and sixty-five thousand four hundred and eight institutes has two to plant at present but the method of real fall to the ground, we spread out respectively evaluate below:

1) one kind is to make alliance, artificial, or guild will be in charge of going up catenary, assure effectiveness of trade data fountainhead;

2) one kind is the catenary on physical grain. Here involves sensor to collect data. Latter has a lot of industries to apply, for instance Chinese herbal medicine, what luxury wraps is coriaceous, artwork.

1, area of + of standard of allied association big data piece of catenary trace to the source system

Allied + area piece of catenary trace to the source the system is to use data alliance to assure to go up the data before catenary is real, next the catenary on data, use area piece catenary to make sure data message is real in transferring a process cannot distort, promotion tradition traces to the source safe problem of the system.

In December 2017, wo Erma, Beijing east, business affairs of electron of university of IBM, Tsinghua trades lab of technical country project announced to establish safe provision jointly area piece catenary traces to the source allied, use namely " allied + area piece catenary " the system strengthens food to track further, but date from sex and security, promotion food supplies the diaphaneity of catenary. These 4 companies or lab built allied organization jointly, the organization has his criterion to assure to collect the origin on the safe side of food data, apply area piece catenary to record at the same time, real time tracks food the data of each condition. In the meantime, allied organization also will supply chain with food relevant manufacturer and superintendency mechanism collaboration, better with facilitating safeguard criterion to assure data source.

Advantage: Allied association, from above to below is helpful for trade organization, be helpful for establishing data standard; The accredit of authoritative orgnaization endorses, be helpful for assuring the authenticity of data; Allied member is supervised each other, prevent data to distort; Inside alliance, data is full go up after catenary, more the number that is helpful for company assets is changed, save cost, promote efficiency to supply catenary to track. Defect: The catenary on data still is relied on type artificially, not only efficiency cannot get assuring, make mistake easily in typing a process, because how this assures,perfect information is typed or one is challenged.

2, content couplet net collects data + of area piece catenary trace to the source system

Content couplet net (IoT) just as its name implies, content couplet net is the Internet that thing other people is linked together. Baidu has two meanings on 100 divisions: One of, the core of content couplet net and foundation remain Internet, be what go up in Internet foundation is outspread with patulous network; Secondly, its client side is outspread and expanded between any article and article, have information exchange and communication, it is interest of appearance of thing other people. Accordingly, we introduce " area of + of content couplet net piece catenary " the technology is built trace to the source newly system, former solve how efficient the issue that obtains actual information, latter cannot distort with its, the characteristic with transparent information solves trustful problem, solve prevent pseudo code to be distorted by pilfer problem.

Does data of area piece catenary trace to the source whether solve the difficult problem that make a holiday?

Content couplet net collects data, use technology of NFC, RFID to add the artificial intelligence authenticity that assures to collect data and efficient sex. Because this is going up the phase before catenary, the development of hardware of content couplet net is crucial.

1.RFID

Have RFID technology commonly usedly, namely wireless radio frequency identifies a technology, can identify specific target through radio question mark and read keep relevant data, and need not identify machinery or optical contact are established between system and specific target. Radio frequency label is product electron code (EPC) physical carrier, adherent go up at the article that can dog, but the whole world is current undertake identify and be readinged writing to its. RFID technology is built as compose " content couplet net " crucial technology, ensure on the security of catenary data, and with what form code differs is radio frequency label does not need to lie identify implement in the line of sight, OK also and built-in in the object that be tracked, avoided a form to pile up the issue that is replaced.

2.Ruff rolls out LoRa wireless collect implement

Ruff rolls out first support formally LoRa of the catenary on data is wireless collect implement: RWTi1000, this are wireless collect implement it is to be based on the wireless data of technology of LoRa enlarge frequency to transmit terminal, have remote, low cost, low power comsumption, tall sensitivity, interference rejection, Gao Ke to rely on the character such as the gender, those who back data is two-way transmit, the IoT that the value data with medium at the same time setting of supportive general business comprises through collecting gateway with data is wireless accept plan, undertake the catenary on data.

Does data of area piece catenary trace to the source whether solve the difficult problem that make a holiday?

The wiring difficulty that this product resolved traditional IoT data to receive the existence in plan of wired group net, cost is tall, periodic the long, difficult fixed position problem after malfunctioning, to business setting at the same time class number of medium core settle accounts is occupied reach value data, can realize more stable and efficient transmission, in the process that assures the catenary on data thereby, the catenary that can realize stability is genteel connect and trade.

3.The catenary on physical feature

Trace to the source traditionally in the system, article by labelled, the information that passes scanning ticket income will undertake the date from of commodity, but the possibility that still often will face label to be replaced, if we can undertake collection contrast to the physical feature of article itself, will solve the problem from label cheat. For example what luxury bag wraps is coriaceous, the grain with different coriaceous corresponding and can different material, the grain that collects packet of packet serves as trace to the source label, such data security get sufficient true.

Advantage: Although the catenary on alliance can solve the trustful problem of one part, but still face the efficiency problem that types artificially, and collect the catenary on data through content couplet net, assured the security of data further, and pass NFC, RFID, or other sensor detects automatically, what appear possibly is wrong when uploading to decrease to be typed artificially on one hand independently, can promote efficiency on the other hand. Defect: But, if pass NFC or RFID to wait,detect means, need the ID of every article correspondence or 2 dimension yard, one content, the exclusive ID that how assures article correspondence not by purloin, be not moved to wrap, still need farther technology to reform. Can choose to detect on the other hand the catenary on the physical feature with unique article, but the catenary on physical feature also has certain limitation, not be every article has go up uniquely catenary feature, so applied limits still remains to think.

3, specific example.

1.Course of study of 8 horses tea is entered be stationed in Beijing east character traces to the source allied

On June 8, 2017, beijing east hold water with business of consumable domain brand hand in hand " Beijing east character traces to the source the alliance that prevent bogus " . On December 14, beijing east still established safe provision jointly with university of Woerma, IBM, Tsinghua area piece catenary traces to the source allied, establishing allied main purpose is a hope assure to go up through much square monitoring the authenticity of catenary data. Course of study of 8 horses tea adds capital actively east area piece catenary prevents platform of bogus date from, the character of each tea, information goes to the butt joint Beijing east store division piece catenary Zhang this, unified show customer, consumer is OK through tracing to the source platform processes date from product, examine, all link that storage, content sorts.

2.Wine Chain

Wine Chain is the whole world is based on area piece first times catenary and trace to the source the red wine that communal catenary and weak center turn technical red wine traces to the source date from system.

Does data of area piece catenary trace to the source whether solve the difficult problem that make a holiday?

Of Wine Chain trace to the source the technology introduced RFID and technology of NFC electron label, use digital certificate mechanism to come to those who realize red wine differentiate control with attributive, the information of the fair key the orgnaization and wine place of business binds the attestation center that passes Wine Chian to generate the ID with entire only network together surely. Collect automatically by net of rock-bottom content couplet again upload.

Because use the means of key of fair key illicit to come the effectiveness of attestation data, medium equipment meets the network have sign one's name to data in order to discern true bogus, the data that uploads so can assure authenticity, but trace to the source the system needs to consider go up not just in uploading a process, still need to consider exclusive ID to whether can be replaced stealthily substitute one thing for another, bring about data to appear in transferring a process missing.

3.Supply the Skuchain that catenary tracks

Skuchain devotes oneself to to develop B2B commerce and supply catenary financing area piece catenary uses a program, in improving the process that supplies catenary finance, the thing that Skuchain wants to finish commodity first sheds catenary to make the chain that capital and content shed genteel again next. So goods other people sheds catenary to also be belonged to trace to the source the one part that trace. Skuchain assembles 2 dimension through be on packing equipment of chip of code, NFC or GPS fixed position, make the content of commodity sheds information to be able to be recorded automatically to SKUChain. Especially equipment of embedded GPS fixed position makes the positional information of goods automatic go up newlier to catenary, make sure content sheds the authenticity of information.

4.Ruff Chain

Ruff is net of couplet of an union other people and area piece the framework of catenary, it includes a distributed operating system and an open type advocate catenary, upload the information interconnection of content and content the point that reachs fictitious world to be opposite thereby bit of network. Ruff is on area piece catenary all content couplet nets trade to will be added time jab, when making sure later generations is usable true and reliable.

Be based on RuffChain and Ruff Lora new the infinite sensor that roll out, ruff Lora is in wireless collect implement respect of power station of smooth hot season and wisdom agriculture domain had abecedarian attempt.

Does data of area piece catenary trace to the source whether solve the difficult problem that make a holiday?

Ruff LoRa is wireless collect implement graph of framework of technology of power station of smooth hot season

If plan institute is shown, pursue medium in the technical framework of power station of smooth hot season, in equipment end, ruff LoRa is wireless collect implement can reach what ammeter undertakes transmission an agreement to match the stability with data to collect in the light of inverter at present, transmission agreement level supports Modbus and DLT645, in network layer Ruff LoRa wireless collect implement between undertake through LoRa agreement wireless data is transmitted, lose number to collect gateway to data as it is said; After collecting gateway to get power station data when data, meeting proper motion undertakes this locality changes the brim to calculate, pass the n data that has settle accounts value Ruff SDK interface to go up directly catenary Ruff Chain, data of the others discharge is normal go up the cloud, terminal client can realize capital negotiable securities to turn operation management on catenary, and the data that power station monitoring carries dimension can pass high in the clouds gets data of power station condition, the steady movement peace keeping that has a power station moves.

Besides apply in the business setting of power station of smooth hot season, ruff LoRa is at present wireless collect implement still begin to use in the business setting of wisdom agriculture, the number that basically faces intelligent conservatory big canopy is defeated as it is said, will wireless collect implement the electric control ark that receives conservatory big canopy repeatedly, through electric control ark gets intensity of acid-base value of temperature and humidity of the air inside big canopy, soil, illumination to wait, unite data again later transmit gateway layer, like the catenary on the data of power station of smooth hot season, after gateway is undertaking this locality brim is calculated, pass value data Ruff Chain of the catenary on Ruff SDK again.

Does data of area piece catenary trace to the source whether solve the difficult problem that make a holiday?

Ruff LoRa is wireless collect implement wisdom is agrotechnical framework graph

To the client, ruff LoRa is wireless collect implement be in above all project cost respect is OK the biggest change reduce cost, the product avoids the character of wiring to distinguish the wired group net at the tradition, reduced devoted facility cost to reduce construction difficulty again already. Be in next group net level, ruff LoRa is wireless collect implement can realize taller stability, let the collection of data layer and transmission implementation consistency, to a few particularly valuable settle accounts class number is occupied, can the former true sex that the oldest rate assures data, bring safe base for the catenary on data. Finally, ruff LoRa is wireless collect implement the character that uses easily simply, convenient installation, debug and carry dimension.

Current, ruff LoRa is wireless collect implement had entered a quantity to produce level, apply setting besides power station of smooth hot season and wisdom agriculture, to intelligence area of garden of Lou Yu, wisdom, share charge the market of many fractionize domain such as picket will use Ruff LoRa wireless collect implement, and be more traditional clienteles upgrade technology of area piece catenary, offer but be born area piece catenary technology solution.

5.China ginseng catenary

China ginseng catenary is the ginseng that fights area piece catenary to make by north prevents bogus to trace to the source platform. The designation that passes the physical feature to ginseng undertakes counting occupying collection going up catenary. Go up to assure the quality of catenary, regard a standard as the catenary on the picture of the character correspondence of ginseng at first, at the same time by go up the company of catenary, the superintendency orgnaization inside the industry and government undertake endorsing assuring to serve as the value of standard ginseng, undertake monitoring to different ginseng through visual sensor next, with had gone up the standard ginseng of catenary makes contrast, reach character classify to the category of ginseng thereby. But whether is the physical feature of ginseng had really apparent idiosyncratic, go up the issue that whether can be the process cost of catenary accepted to wait the need when still a few use be born and promotion a moment to consider.

6.Ifoodschain

Ifoodschain, the area that wants to build a food that opens source, open mode and relevant domain piece catenary zoology platform, it is to want to develop a fair chain at present + 2 application: Include Ifoodschain area piece catenary + the system of ground floor of food industry USP of the distributed database, MeMS food that faces C end detects those who face B end is DAPP, distributed cross condition trade community.

Does data of area piece catenary trace to the source whether solve the difficult problem that make a holiday?

The provision that carries to C on the needle detects DAPP, ifoodchain company and other trace to the source the company is different, what other company adopts is B carries an enterprise to undertake detecting next the catenary on data, the user can undertake examining through exclusive ID, and the heavy difficulty that ID cannot be duplicated to wait can be an enterprise. The monitoring tool that Ifoodchain encourages an user to buy a kind of physics is super bougie or test paper, undertake data is collected in the beef that can buy through inserting bougie, real time sends catenary to go up, and the standard data that inventory of data of catenary before last has a course to superintend a branch to endorse, have data contrasting sentencing reading whether beef is real beef, fleshy quality is good. Besides apply at the flesh kind monitor still wait for promotion all sorts of food industries to seafood, vegetable, fruit, and the origin of standard data can cooperate with research organization, lab, collect the standard data of food, and the visible index that parameter changeover is those who judge food quality, will detect the result contrasts to it can judge.

But super bougie has not fixed a price centrally, the value is relative civilian wait for farther price level even, but people is higher and higher to the requirement of life character, dietary health is an issue that cannot ignore for certain, should fix a price only reasonable, believe or can seek the monitoring way that hold in both hands as consumer. In addition, the company still alleges can undertake to the user Token is rewarded, but specific detailed rules has not been fulfilled, be like incentive mechanism, we believe or can attract many customer.

7.Codex

To the artwork that is worth at high price, of true bogus sex differentiating is one of the biggest challenges inside course of study. The company plan of Codex applies technology of area piece catenary to come in artwork market the authenticity of artwork of test and verify. Current and character, artwork traces to the source is a difficult and lengthy process, normally people can pass paper file and receipt to undertake filtration, but these files are in be on the move there is a lot of uncertainty in the process.

Codex is include antique car and jewel inside artwork and collect article developed to distributing model database. In the meantime, one of main application that are based on development of area piece catenary are called Biddable. The person that this software will allow the hold of digital money bids in the auction. When be bought every time or selling an artwork, its origin setting and relevant documentation will be gone to by memory in area piece catenary, ensure it and artwork are bound together, make did not come thereby buy the home to have identification and can found to be able to be in area piece catenary to artwork the record that searchs.

Of attestation mechanism run means to be as follows:

Does data of area piece catenary trace to the source whether solve the difficult problem that make a holiday?

Be like,pass later RFID label or synthetic DNA, with its in real assets the number shows between establish safe connection, assure authenticity thereby.

The distributed database that Codex builds can record the setting origin of artwork thoroughly, but setting origin is differentiated by who, register on catenary, temporary Codex was not explained, this one part may need to strong center is changed and trust the orgnaization of the mechanism or alliance undertake endorsing, finish when data on current pass on makes wait to be able to get again after catenary assure and current efficiency is able to promote.

4, area piece catenary prevents bogus to trace to the source systematic future develops

But the feature that still a few companies saw article itself, use physical feature to go up directly catenary, contrast passes the standard data that endorse originally, undertake detecting. For example the variety quality of ginseng deserves to have different ginseng, undertake detecting through judging contrast.

But the article that has physical feature is minority after all, and common saying says the identical without two leaf on the world, detecting physical feature when still put in physical feature hard further data is changed, contrast detects the process may forbid truly.

Although, each apply direct be born to still be put in a few problems, have addition of area piece catenary trace to the source the system did not overturn to trace to the source traditionally directly domain, but the occurrence of area piece catenary still was improved trace to the source system, the first, on catenary deliver what the process assured data to cannot distort; The 2nd, because the distributed Zhang of area piece catenary this, making a holiday is not only a Zhang this make a holiday, drive up data makes false cost; The 3rd, improved the newer efficiency of real time information.

The hope is in before long in the future, content couplet net collects data + of area piece catenary trace to the source systematic method can have better solution to be able to solve people to living the food safety of be closely bound up and commodity artwork are true the problem of bogus!

Development of application of be born of industry of area piece chain still lies inchoate and primary level, we purpose of compose of one billion four hundred and ten million and sixty-five thousand four hundred and eight institutes is cast a brick to attract jade-offer a few commonplace remarks by way of introduction so that others may come up with valuable opinions, expect and each industry big ox is great collision scintilla,

未经允许不得转载:News » Does data of area piece catenary trace to the source whether solve the difficult problem that make a