CN106779751A - A kind of Food Logistics supply chain system and method based on UHF RFID - Google Patents
A kind of Food Logistics supply chain system and method based on UHF RFID Download PDFInfo
- Publication number
- CN106779751A CN106779751A CN201611240851.9A CN201611240851A CN106779751A CN 106779751 A CN106779751 A CN 106779751A CN 201611240851 A CN201611240851 A CN 201611240851A CN 106779751 A CN106779751 A CN 106779751A
- Authority
- CN
- China
- Prior art keywords
- rfid
- module
- food
- cloud service
- service platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
- G06K17/0029—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/087—Inventory or stock management, e.g. order filling, procurement or balancing against orders
Abstract
The invention discloses a kind of Food Logistics supply chain system and method based on UHF RFID, including production and processing center module, home-delivery center's module and retail central module, three data of module collect data and the corresponding computer of typing by rfid interrogator, pass through LAN LANs again by data message typing ERP system, finally it is connected with the cloud service platform based on RFID, carries out information sharing.The data of the production and processing center module, home-delivery center's module and retail central module are mutually shared, home-delivery center's module includes warehousing management module and dispatching module, the warehousing management module enters library module including food and food goes out library module, and adds RFID anti-counterfeiting authentication methods.The system gives a kind of anti-counterfeiting authentication method to the storage in food delivery and outbound process optimization, can be used for the true and false identification of food, so that the preferably legitimate rights and interests of protection intellectual property and consumer.
Description
Technical field
The present invention relates to management information system technology field, more particularly to a kind of Food Logistics supply based on UHF-RFID
Catenary system and method.
Background technology
For a long time, China's security status of food all allows of no optimist, and security incident takes place frequently, great food particularly in recent years
Product security incident, involves scope extensively, and influence face is big, has greatly hit confidence of the consumer to domestic food.Agri-food supply chains
It is the net of the food production and supply being made up of relevant enterprises such as agricultural, food processing industry, wholesale and retail industry and Logistics Distribution Industries
Network system.Different from other industry, the consequence and harmful effect that food goes wrong caused cannot often disappear in a short time
Remove, in some instances it may even be possible to collapse supply chain, this requires enterprise from selection raw material, carried out sternly to links such as transport, processing
The quality of lattice is checked on.Agri-food supply chains are relatively long, the link such as covering kind cultivation, production and processing, circulation and Catering Management, this
A little links are all linked with one another in agri-food supply chains, interact so that the thing of not exclusively certain enterprise of ensuring food safety,
But must consider from supply chain entirety angle.
Radio frequency identification (Radio Frequency Identification, RFID) is a kind of contactless automatic
Identification technology, obtains by radiofrequency signal automatic identification destination object and automatically related data.With traditional bar code, magnetic stripe,
Magnetic card, IC-card etc. are compared, RFID, and especially UHF-RFID technologies have high degree of automation, identification distance is remote, store information content
Greatly, the advantages of environmental suitability is strong, has been increasingly becoming optimization food production, has ensured the important means of food security, and in food
Processing, tracking are traced to the source, production process optimization, the aspect such as false proof are widely applied.
Food Logistics supply chain system based on UHF-RFID be widely studied with application, such as《Food based on RFID
Safety in production record supervisory systems》(South China Science & Engineering University's Master's thesis, 2015-11-26) is using RFID technique in food production
During supervision, the overall process of monitoring and the quick identification recalled of fortune storage lock ring section in, and give the solution party of correlation
Case;《Meat product supply chain traceability system is set up based on RFID, QR Code, NFC》(University Of Agriculture and Forestry In Fujian's journal (natural science
Version), 2016,45 (4):471:475) meat product supply chain is divided into raising, processing and circulation three phases, according to each rank
The work characteristics of section, selects the combination application exploitation traceability system of the technologies such as RFID, QR Code, NFC respectively.Though these methods
So there are certain application scenarios, but lay particular emphasis on information record and tracing management between each link of supply chain, lack the tool in link
Body operating method, and the anti-counterfeiting technology of correlation is studied.
The content of the invention
In agri-food supply chains system design, it is all supply chain to plant cultivation, production and processing, dispatching, transport and retail link
Important component, wherein production and processing, dispatching and retail be key link.Although different links are in physical composition
On be separate, but between different link but there is relation of interdependence in logic.Numerous studies show,
Plant cultivating link and use RFID technique, because the kind cultivation time limit being related to is long, information capacity is big, and a line operator quality
It is low, do not have feasibility using RFID technique in this link.Present invention is primarily based on production and processing, dispatching and retail link, and
Emphasis lays particular emphasis on dispatching link, and a kind of general food supply linkwork based on UHF-RFID is proposed using UHF-RFID technologies
System and method.
A kind of Food Logistics supply chain system based on UHF-RFID, including:
Production and processing center module:The data of the production and processing center module are collected by rfid interrogator and typing is corresponding
Computer, then by LAN LANs by data message typing produce and process center ERP system.
Home-delivery center's module, the data of home-delivery center's module are collected by rfid interrogator and typing is calculated accordingly
Machine, then by LAN LANs by data message typing home-delivery center ERP system.
Retail central module, the data of the retail central module collect data by rfid interrogator and typing is counted accordingly
Calculation machine, then by LAN LANs by data message typing retail central ERP system.
The data of the production and processing center module, home-delivery center's module and retail central module are mutually shared, the life
The data for producing machining center ERP system, home-delivery center's ERP system and retail central ERP system finally take with the cloud based on RFID
Business platform is connected, and carries out information sharing.
Home-delivery center's module includes warehousing management module and dispatching module, and the warehousing management module enters including food
Library module and food go out library module, and add RFID anti-counterfeiting authentication methods.
Preferably, the flow that the food enters library module is:
S1:Food provider is delivered and is sent to goods, and food casing has puted up label in production and processing link, together
When shipping order is entered into the cloud service platform based on RFID;
S2:Home-delivery center obtains storage from the cloud service platform based on RFID and notifies;
S3:RFID sampling verifications, that is, be sampled examination before being put in storage, the packaging for foodstuff for randomly choosing sample passes through RFID
Reader, the sample size is contract engagement quantity or industry experience value, and will be sent to food information is carried out with storage announcement information
Compare.If inconsistent, into abnormality processing;If consistent, be put in storage;
S4:During storage, by food cargo by storage button RFID portal frames, warehousing quantity is gathered, form storage information, and
It is uploaded in the cloud service platform based on RFID;
S5:The quantity verification of storage food cargo.The quantity that RFID portal frames are read is checked with shipping order, if one
Cause, then restocking treatment;If inconsistent, abnormality processing is carried out;
S6:Food shelf label information is updated, and goods yard information is uploaded to the cloud service platform based on RFID.
Preferably, the flow that food goes out library module is:
S1:Retail central needs to formulate plan of needs according to client, and uploads to the cloud service platform based on RFID;
S2:Cloud service platform based on RFID automatically forms slab discharge planning and notifies warehouse outbound;
S3:After warehouse receives slab discharge planning notice, warehouse picking is carried out with sorting;
S4:According to warehouse picking and sorting situation, more NEW PRODUCTS FRID label information is simultaneously uploaded to the cloud clothes based on RFID
Business platform;
S5:Food is sorted and packaging after, transport carries out outbound statistics, and outbound is believed to outbound mouthful RFID portal frames
Breath is uploaded to the cloud service platform based on RFID.
S6:Outbound food cargo quantity is checked.The quantity that RFID portal frames are read is checked with shipment notification, if one
Cause, then outbound dispatching;If inconsistent, abnormality processing is carried out.Preferably, the RFID anti-counterfeiting authentication methods are:
Original state:ID, key, random number generator (RNG), hash functions simultaneously read shape in locking
State;
Rfid interrogator:It is connected with cloud service platform database;
Cloud service platform database:Deposit all of RFID label tag ID and corresponding key values, hash functions.
Anti-fake certificate flow is as follows:
S1:Rfid interrogator generates a random number r0, and r0 and read-write requests query are sent into RFID label tag;
S2:RFID tag also generates a random number r1, and process to after query and r0:A=hash (r1&
Key), b=hash (a&r0), then pass a, b back rfid interrogator;
S3:R0 is sent to cloud service platform database by rfid interrogator, while a, b and r1 are transmitted into cloud service platform
Database;
S4:Cloud service platform database will calculate each an=hash (r1&kn), bn=hash (an&r0).If finding
Bk=b, then it represents that RFID label tag is effective label;
S5:M=hash (an&kn&bn) is calculated, result and RFID label tag effective information are sent to read write line;
S6:M is sent to RFID label tag by read write line, tag computation m ,=hash (a&k&b), if m=m, then RFID label tag
Think effective read write line, label goes lock-out state to enter response status, waits read write line read-write.
Preferably, the safety analysis of the RFID anti-counterfeiting authentication methods is as follows:
A) it is illegal to read:Because rfid interrogator can just be read out with labeling requirement after certification, so can be effective
Prevent illegal reading and label information leakage;
B) data deciphering:Because the content transmitted each time is processed by random number participation, and encrypted, attacked
The person of hitting can only eavesdrop the ciphertext in communication, it is impossible to crack wherein content;
C) forward secrecy:Label and read write line can all produce new random number during due to each certification, and be authenticated, institute
With the authentication information being difficult before deducing on this basis;
D) replay attack:Replay attack refers to that attacker is entered using the information disguising for obtaining into effective label and read write line
Row communication, but because read write line is inquired about with different random numbers every time, so the information that attacker records cannot be right
New inquiry request carries out effective response.
Compared with the prior art, the present invention has the beneficial effect that:To the storage in food delivery and outbound process optimization,
And a kind of anti-counterfeiting authentication method is given, can be used for the true and false identification of food, so as to preferably protect intellectual property and consumption
The legitimate rights and interests of person.
Brief description of the drawings
Fig. 1 is a kind of flow chart of the Food Logistics supply chain system based on UHF-RFID;
Fig. 2 enters the flow chart of library module for food;
Fig. 3 goes out the flow chart of library module for food.
Specific embodiment
The present invention is made with reference to specific embodiment further explain.
A kind of Food Logistics supply chain system based on UHF-RFID, including:
Production and processing center module:The data for producing and processing center module are counted accordingly by rfid interrogator collection and typing
Calculation machine, then data message typing is produced and processed by center ERP system by LAN LANs.
Home-delivery center's module, the data of home-delivery center's module are collected and the corresponding computer of typing by rfid interrogator, then
By LAN LANs by data message typing home-delivery center ERP system.
Retail central module, the data of retail central module collect data by rfid interrogator and typing is calculated accordingly
Machine, then by LAN LANs by data message typing retail central ERP system.
The data of production and processing center module, home-delivery center's module and retail central module are mutually shared;In production and processing
The data of heart ERP system, home-delivery center's ERP system and retail central ERP system finally with the cloud service platform phase based on RFID
Even, information sharing is carried out.
Home-delivery center's module include warehousing management module and dispatching module, warehousing management module including food enter library module and
Food goes out library module, and adds RFID anti-counterfeiting authentication methods.
The flow that food enters library module is:
S1:Food provider is delivered and is sent to goods, and food casing has puted up label in production and processing link, together
When shipping order is entered into the cloud service platform based on RFID;
S2:Home-delivery center obtains storage from the cloud service platform based on RFID and notifies;
S3:RFID sampling verifications, that is, be sampled examination before being put in storage, the packaging for foodstuff for randomly choosing sample passes through RFID
Reader, the sample size is contract engagement quantity or industry experience value, and will be sent to food information is carried out with storage announcement information
Compare.If inconsistent, into abnormality processing;If consistent, be put in storage;
S4:During storage, by food cargo by storage button RFID portal frames, warehousing quantity is gathered, form storage information, and
It is uploaded in the cloud service platform based on RFID;
S5:The quantity verification of storage food cargo.The quantity that RFID portal frames are read is checked with shipping order, if one
Cause, then restocking treatment;If inconsistent, abnormality processing is carried out;
S6:Food shelf label information is updated, and goods yard information is uploaded to the cloud service platform based on RFID.
The flow that food goes out library module is:
S1:Retail central needs to formulate plan of needs according to client, and uploads to the cloud service platform based on RFID;
S2:Cloud service platform based on RFID automatically forms slab discharge planning and notifies warehouse outbound;
S3:After warehouse receives slab discharge planning notice, warehouse picking is carried out with sorting;
S4:According to warehouse picking and sorting situation, more NEW PRODUCTS FRID label information is simultaneously uploaded to the cloud clothes based on RFID
Business platform;
S5:Food is sorted and packaging after, transport carries out outbound statistics, and outbound is believed to outbound mouthful RFID portal frames
Breath is uploaded to the cloud service platform based on RFID.
S6:Outbound food cargo quantity is checked.The quantity that RFID portal frames are read is checked with shipment notification, if one
Cause, then outbound dispatching;If inconsistent, abnormality processing is carried out.
RFID anti-counterfeiting authentication methods are:
Original state:ID, key, random number generator (RNG), hash functions simultaneously read shape in locking
State;
Rfid interrogator:It is connected with cloud service platform database;
Cloud service platform database:Deposit all of RFID label tag ID and corresponding key values, hash functions.
Anti-fake certificate flow is as follows:
S1:Rfid interrogator generates a random number r0, and r0 and read-write requests query are sent into RFID label tag;
S2:RFID tag also generates a random number r1, and process to after query and r0:A=hash (r1&
Key), b=hash (a&r0), then pass a, b back rfid interrogator;
S3:R0 is sent to cloud service platform database by rfid interrogator, while a, b and r1 are transmitted into cloud service platform
Database;
S4:Cloud service platform database will calculate each an=hash (r1&kn), bn=hash (an&r0).If finding
Bk=b, then it represents that RFID label tag is effective label;
S5:M=hash (an&kn&bn) is calculated, result and RFID label tag effective information are sent to read write line;
S6:M is sent to RFID label tag by read write line, tag computation m ,=hash (a&k&b), if m=m, then RFID label tag
Think effective read write line, label goes lock-out state to enter response status, waits read write line read-write.
The safety analysis of RFID anti-counterfeiting authentication methods is as follows:
A) it is illegal to read:Because rfid interrogator can just be read out with labeling requirement after certification, so can be effective
Prevent illegal reading and label information leakage;
B) data deciphering:Because the content transmitted each time is processed by random number participation, and encrypted, attacked
The person of hitting can only eavesdrop the ciphertext in communication, it is impossible to crack wherein content;
C) forward secrecy:Label and read write line can all produce new random number during due to each certification, and be authenticated, institute
With the authentication information being difficult before deducing on this basis;
D) replay attack:Replay attack refers to that attacker is entered using the information disguising for obtaining into effective label and read write line
Row communication, but because read write line is inquired about with different random numbers every time, so the information that attacker records cannot be right
New inquiry request carries out effective response.
Storage in food delivery and outbound process optimization are given a kind of anti-counterfeiting authentication method by the system, can be with
For the true and false identification of food, so that the preferably legitimate rights and interests of protection intellectual property and consumer
The above, the only present invention preferably specific embodiment, but protection scope of the present invention is not limited thereto,
Any one skilled in the art the invention discloses technical scope in, technology according to the present invention scheme and its
Inventive concept is subject to equivalent or change, should all be included within the scope of the present invention.
Claims (5)
1. a kind of Food Logistics supply chain system based on UHF-RFID, it is characterised in that including:
Production and processing center module:The data of the production and processing center module are collected by rfid interrogator and typing is counted accordingly
Calculation machine, then data message typing is produced and processed by center ERP system by LAN LANs.
Home-delivery center's module, the data of home-delivery center's module are collected and the corresponding computer of typing by rfid interrogator, then
By LAN LANs by data message typing home-delivery center ERP system.
Retail central module, the data of the retail central module collect data by rfid interrogator and typing is calculated accordingly
Machine, then by LAN LANs by data message typing retail central ERP system.
The data of the production and processing center module, home-delivery center's module and retail central module are mutually shared, and the production adds
The data of work center ERP system, home-delivery center's ERP system and retail central ERP system are finally flat with the cloud service based on RFID
Platform is connected, and carries out information sharing.
Home-delivery center's module includes warehousing management module and dispatching module, and the warehousing management module includes that food is put in storage mould
Block and food go out library module, and add RFID anti-counterfeiting authentication methods.
2. a kind of Food Logistics supply chain system based on UHF-RFID according to claim 1, it is characterised in that described
The flow that food enters library module is:
S1:Food provider is delivered and is sent to goods, and food casing has puted up label in production and processing link, while will
Shipping order is entered into the cloud service platform based on RFID;
S2:Home-delivery center obtains storage from the cloud service platform based on RFID and notifies;
S3:RFID sampling verifications, that is, be sampled examination before being put in storage, the packaging for foodstuff for randomly choosing sample is read by RFID
Device, the sample size is contract engagement quantity or industry experience value, will be sent to food information and compares with storage announcement information.
If inconsistent, into abnormality processing;If consistent, be put in storage;
S4:During storage, by food cargo by storage button RFID portal frames, warehousing quantity is gathered, form storage information, and upload
Into the cloud service platform based on RFID;
S5:The quantity verification of storage food cargo.The quantity that RFID portal frames are read is checked with shipping order, if unanimously,
Then restocking treatment;If inconsistent, abnormality processing is carried out;
S6:Food shelf label information is updated, and goods yard information is uploaded to the cloud service platform based on RFID.
3. a kind of Food Logistics supply chain system and method based on UHF-RFID according to claim 1, its feature exist
In the flow that food goes out library module is:
S1:Retail central needs to formulate plan of needs according to client, and uploads to the cloud service platform based on RFID;
S2:Cloud service platform based on RFID automatically forms slab discharge planning and notifies warehouse outbound;
S3:After warehouse receives slab discharge planning notice, warehouse picking is carried out with sorting;
S4:According to warehouse picking with sorting situation, more NEW PRODUCTS FRID label information and be uploaded to the cloud service based on RFID put down
Platform;
S5:Food is sorted and packaging after, transport carries out outbound statistics to outbound mouthful RFID portal frames, and by outbound information
Reach the cloud service platform based on RFID.
S6:Outbound food cargo quantity is checked.The quantity that RFID portal frames are read is checked with shipment notification, if unanimously,
Then outbound dispatching;If inconsistent, abnormality processing is carried out.
4. a kind of Food Logistics supply chain system based on UHF-RFID according to claim 1, it is characterised in that described
RFID anti-counterfeiting authentication methods are:
Original state:ID, key, random number generator (RNG), hash functions are simultaneously in locking reading state;
Rfid interrogator:It is connected with cloud service platform database;
Cloud service platform database:Deposit all of RFID label tag ID and corresponding key values, hash functions.
Anti-fake certificate flow is as follows:
S1:Rfid interrogator generates a random number r0, and r0 and read-write requests query are sent into RFID label tag;
S2:RFID tag also generates a random number r1, and process to after query and r0:A=hash (r1&key),
B=hash (a&r0), then pass a, b back rfid interrogator;
S3:R0 is sent to cloud service platform database by rfid interrogator, while a, b and r1 are transmitted into cloud service platform data
Storehouse;
S4:Cloud service platform database will calculate each an=hash (r1&kn), bn=hash (an&r0).If finding bk=
B, then it represents that RFID label tag is effective label;
S5:M=hash (an&kn&bn) is calculated, result and RFID label tag effective information are sent to read write line;
S6:M is sent to RFID label tag by read write line, tag computation m ,=hash (a&k&b), if m=m, then RFID label tag thinks
Effective read write line, label goes lock-out state to enter response status, waits read write line read-write.
5. a kind of Food Logistics supply chain system based on UHF-RFID according to claim 4, it is characterised in that described
The safety analysis of RFID anti-counterfeiting authentication methods is as follows:
A) it is illegal to read:Because rfid interrogator can just be read out with labeling requirement after certification, so can effectively prevent
It is illegal to read and label information leakage;
B) data deciphering:Because the content transmitted each time is processed by random number participation, and encrypted, attacker
The ciphertext in communication can only be eavesdropped, it is impossible to crack wherein content;
C) forward secrecy:Label and read write line can all produce new random number during due to each certification, and be authenticated, so very
Hardly possible deduce on this basis before authentication information;
D) replay attack:Replay attack refers to that attacker is led to using the information disguising for obtaining into effective label and read write line
Letter, but because read write line is inquired about with different random numbers every time, so the information that attacker records cannot be to new
Inquiry request carries out effective response.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611240851.9A CN106779751A (en) | 2016-12-29 | 2016-12-29 | A kind of Food Logistics supply chain system and method based on UHF RFID |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611240851.9A CN106779751A (en) | 2016-12-29 | 2016-12-29 | A kind of Food Logistics supply chain system and method based on UHF RFID |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106779751A true CN106779751A (en) | 2017-05-31 |
Family
ID=58923522
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611240851.9A Pending CN106779751A (en) | 2016-12-29 | 2016-12-29 | A kind of Food Logistics supply chain system and method based on UHF RFID |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106779751A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109325719A (en) * | 2018-09-21 | 2019-02-12 | 重庆长安民生物流股份有限公司 | Intelligence production turnover method based on RFID |
CN112101934A (en) * | 2020-08-27 | 2020-12-18 | 东南大学 | Mobile phone campus one-card control system based on NFC technology and authentication method thereof |
WO2022037125A1 (en) * | 2020-08-17 | 2022-02-24 | 北京京东振世信息技术有限公司 | Method and device for stock handling |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040210495A1 (en) * | 2001-04-04 | 2004-10-21 | White Daniel F. | System and method of managing time-sensitive items |
CN101847199A (en) * | 2009-03-24 | 2010-09-29 | 复旦大学 | Security authentication method for radio frequency recognition system |
CN102799975A (en) * | 2012-07-04 | 2012-11-28 | 四川航天系统工程研究所 | Full life circle management system for food based on RFID (radio frequency identification) and implementation method thereof |
-
2016
- 2016-12-29 CN CN201611240851.9A patent/CN106779751A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040210495A1 (en) * | 2001-04-04 | 2004-10-21 | White Daniel F. | System and method of managing time-sensitive items |
CN101847199A (en) * | 2009-03-24 | 2010-09-29 | 复旦大学 | Security authentication method for radio frequency recognition system |
CN102799975A (en) * | 2012-07-04 | 2012-11-28 | 四川航天系统工程研究所 | Full life circle management system for food based on RFID (radio frequency identification) and implementation method thereof |
Non-Patent Citations (1)
Title |
---|
刘元庆: "基于RFID技术的防伪系统设计与研究", 《中国优秀硕士学位论文全文数据库》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109325719A (en) * | 2018-09-21 | 2019-02-12 | 重庆长安民生物流股份有限公司 | Intelligence production turnover method based on RFID |
WO2022037125A1 (en) * | 2020-08-17 | 2022-02-24 | 北京京东振世信息技术有限公司 | Method and device for stock handling |
CN112101934A (en) * | 2020-08-27 | 2020-12-18 | 东南大学 | Mobile phone campus one-card control system based on NFC technology and authentication method thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tian | An agri-food supply chain traceability system for China based on RFID & blockchain technology | |
CN103530808B (en) | Whole-process tracing system for quality safety of fruit logistics | |
CN108985790A (en) | Method for anti-counterfeit, system, computer equipment and storage medium based on block chain | |
CN110516965A (en) | The credible retrospect model of oil and foodstuffs full supply chain and construction method based on block chain | |
CN105303220A (en) | Two-dimensional code production method for wine bottle | |
CN109360000A (en) | A kind of system that commodity counterfeit prevention is traced to the source, method, equipment and storage medium | |
CN105761088A (en) | Food source tracing system based on RFID and two-dimensional code | |
Shingh et al. | Dairy supply chain system based on blockchain technology | |
CN112561250A (en) | Cold chain logistics management system based on block chain | |
US9633326B2 (en) | Load distribution and consolidation tracking system | |
CN104331762B (en) | A kind of anti-tamper archives food safety trace back system | |
CN106779751A (en) | A kind of Food Logistics supply chain system and method based on UHF RFID | |
CN110880118A (en) | Block chain-based high-quality agricultural product guarantee method | |
CN107392557A (en) | Agricultural input product Sales Supervisor's system and method | |
Sun et al. | Application of Blockchain and RFID in Anti-counterfeiting Traceability of Liquor | |
CN111178912A (en) | Grain quality tracing method and system based on block chain | |
CN106971311A (en) | A kind of false proof traceability system of logistics Means of Agricultural Production and method | |
Mohan | Improve food supply chain traceability using blockchain | |
Qiao et al. | Research on vegetable supply chain traceability model based on two-dimensional barcode | |
CN106485509A (en) | A kind of commodity multi-stage authentication anti-fake traceability system based on Quick Response Code and method | |
CN106339888A (en) | RFID wine product all-round anti-fake monitoring method | |
Abdullah et al. | Efficiency optimization in supply chain using RFID technology | |
Deng et al. | Research on a traceability scheme for a grain supply chain | |
Melski et al. | Managing RFID data in supply chains | |
CN206757700U (en) | A kind of false proof traceability system of logistics Means of Agricultural Production |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170531 |
|
RJ01 | Rejection of invention patent application after publication |