Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification...
Transcript of Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification...
![Page 1: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/1.jpg)
Building Radio frequency IDentification solutions for the Global EnvironmentBuilding Radio frequency IDentification solutions for the Global Environment
BRIDGE Webinar – Discovery Services: Design, Security, Integration and
Standardisation
![Page 2: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/2.jpg)
Outline
• About BRIDGE
• Discovery Service Design
• Security Framework
• Standardisation activity
© 2008
• Standardisation activity
• Integration with Track and Trace Applications
• Q&A
![Page 3: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/3.jpg)
BRIDGE in a few words
• A 3 years project
• Started on July 1st 2006
• 30 Partners
• 15 work packages
© 2008
• 15 work packages
• Total budget: €13 millions
• European Union funding:€ 7,5 millions
![Page 4: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/4.jpg)
BRIDGE Partners
GS1
Global Office (Coordinator)
China
France
Germany
Labs/Universities
Cambridge
ETH Zürich
Fudan
TUG Graz
Solution Providers
Bénédicta
Carrefour
gardeur
Kaufhof
End users
AIDA Centre
AT4 wireless
BT
CAEN
© 2008
Germany
Poland
Spain
UK
UPC Barcelona Nestlé UK
Northland
Sony
Confidex
Domino
JJ Associates
Melior
SAP
UPM Raflatac
Verisign UK
7 5 7 11
![Page 5: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/5.jpg)
Building Radio frequency IDentification solutions for the Global Environment
WP12: Training Platform, Courseware & Certification
WP13: Dissemination & Adoption Tools
Business
Horizontal
Activities
WP15: Innovation policy and public policy
WP14: Project management
© 2008
WP4: Security
WP3: Serial-Level Supply Chain Control
WP2: Serial-Level Lookup Service
WP1: Hardware Development
Technical
Development
Business
Development
![Page 6: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/6.jpg)
Design and Prototype
Miguel Angel Guijarro
BRIDGE Discovery Services
© 2008
AT4 wireless
21st May 2008
![Page 7: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/7.jpg)
Discovery Service Design: Motivation
• At the time the project was defined, the EPCglobal ratified ONS standard provided a method for accessing manufacturing information about a product class
• However, there was no standard
© 2008
• However, there was no standard for finding multiple sources of item-level information
• Serial-level lookup services or Discovery Services were envisaged as the last layer in the EPCglobal architecture
• Also, they were conceived as being complementary to another standard, EPCIS, which was ratified in April 2007
![Page 8: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/8.jpg)
Discovery Service Design: Steps
1) Gather Requirements from RFID community with special focus on integration with current IT systems
2) Develop a high level High Level Design
Requirements Analysis for serial-level lookup service
Requirements for integrationwith existing BIS
© 2008
2) Develop a high level design for DS
3) Implement a prototype
4) Contribute to standardization,promote value of RFID and EPC standards
Detailed Design and Prototype Development
Migration andAdoption Tools
![Page 9: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/9.jpg)
Discovery Service Design: Requirements & Design
Conclusions
• Security and access control policies are key for success of the service
• Design model is
– Synchronous response to
© 2008
– Synchronous response to queries
– Respond with a list of pointers to sources of information (not replication – ownership of data remains in SC companies)
– Independent of external components and compatible with EPCIS interface standard
![Page 10: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/10.jpg)
Discovery ServicesHigh-level design - key features
• We considered different interaction models between client, Discovery Service and resource - in terms of impact on performance and security (protecting confidentiality of both client and resource)
• Our internal data model borrows some data fields and ideas from EPCIS events - but we don't necessarily return the complete events that were published - just a time-ordered list of links with minimal meta-data. The
© 2008
meta-data in our DS records/events is primarily to provide 'hooks' for defining and enforcing access control policies, so you can say for example "I'll share receipt info with my suppliers - but not with my customers"
• We don't embed URLs within records because URLs can become broken.Instead, we embed the URL in a PublisherProfile and embed its ID within the DS record. If the URL has to change, a new updated PublisherProfile with the same ID can replace the old one, without voiding the DS records.
• We include a serviceType field (like in ONS) to indicate the kind of service to expect at each URL (e.g. EPCIS, DS, web service, HTML, XML)
![Page 11: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/11.jpg)
Discovery Service Design: Architecture of Prototype
SOAP
SOAP
DS-Query Interface
Query Proxy Layer
Query
Application
DS
http
http
Sniffer
EPCIS RepositoryAccada
Filtering
Standing Query
Inteface
SOAP
© 2008
SOAPSOAP
DS CoreRepository
DS-Publish Interface
Publish Proxy Layer
Query Proxy Layer
http
http
http
http
Sniffer
EPCIS Capture InterfaceAccada
Publish
Application
IS-DS Interface
SOAPFiltering
Schedule Checker
DS Std QueryRepository
Event-Manager
Interface
Messagin
g S
erv
ice
![Page 12: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/12.jpg)
EPCIS Repository
Discovery Service Design: IS – DS interface
IS-DS Interface
• IS-DS Interface feeds DS repository with relevant filtered data
• IS-DS Interface connects EPCIS and DS and shall be transparent to EPCIS
© 2008
Sniffer SOAP
http
EPCIS Capture Interface
DS-Publish InterfaceFiltering
http
SOAP
IS-DS data flow
![Page 13: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/13.jpg)
- Four public deliverables available in www.bridge-project.eu
– D2.1 Requirements Requirement document of serial-level lookup service for various industries
– D2.2 Working prototype of serial-level lookup service
– D2.3 Integration of Serial-level Data into Existing Business Information Systems
– D2.4 High Level Design
Discovery Service Design: Conclusions
© 2008
- DS Prototype is made public as LGPL, in addition, service will be hosted along BRIDGE time frame (until June 2009) and is open for use by external parties. DS V2.1.2 is ready since January 2008
- Applications based on Discovery Services could provide following benefits:
• Traceability of individual items, not only shipments (i.e. saving time and money locating possible faulty products already distributed - i.e. selective recalls)
• Track and trace throughout the lifecycle of products, not only up to the point of sale
• Detailed information about all movements along supply chains
• Detection of potential counterfeiting
• New services for customers
![Page 14: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/14.jpg)
Discovery Services & Security
Trevor Burbridge
© 2008
Trevor Burbridge
BT Networks Research Centre
21st May 2008
![Page 15: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/15.jpg)
BRIDGE WP4: Security
Security Analysis
to gather end user
requirements
Secure Readers
to enable multi -
party services
Security Framework
enables data sharing
while protecting integrity
and confidentiality
Secure Tags protect
confidentiality & privacy
and enables product
authentication
© 2008
EPCglobal network
enables interoperability
across multiple locations
party services authentication
• WP4 lead:
• WP4 members:
![Page 16: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/16.jpg)
Starting Design Principles
• Publishers continue to own their data
• Discovery Service can enforce some community behaviour
• Clients require confidentiality
• Choice of Discovery Service(s)
© 2008
• Choice of Discovery Service(s)
• No enforced network routing path or data hosting location (e.g. ONS)
• Autonomous domain instead of unified inter-network
– No clear requirement (can reach multiple autonomous DSs), security harder (propagation of security policies)
• Lightweight & scalable (do not replicate EPCIS roles)
![Page 17: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/17.jpg)
Communication Models
• Can characterise by:
– Push vs. pull (two links)
– Data vs. reference
– Needs vs. resources
C I R12
3
Setup
Discovery
Service Fulfilment
Meta-Resource
Resource
Replication
Service Request
Service Response
C I R1 2
Setup
Discovery
1
Resource Capability Subscription
© 2008
Protects both client and
publisher confidentiality
C I R12
3
Setup
Discovery
Service Fulfilment
4
5
Resource Availability
Publication
Directory Resource
Lookup
Resource
EngagementResource Directory
C I R1 2
3
Discovery
Service Fulfilment
Query Propagation
Service Request
Service Response
C I R3 2
Setup
Discovery
Service Fulfilment
Resource Notification4
5
Resource
Engagement
1
Client Interest Subscription
Resource Availability
Notification
![Page 18: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/18.jpg)
Approach to Security
• Use existing standards– RFID services not operated in isolation
• Build flexible access control technology substrate– Data, service logic and security policy separated
© 2008
– Data, service logic and security policy separated
• Work with business to identify real uses/requirements and security policies
• Narrow and optimise enforcement technology
• Provide management tools and policy automation
![Page 19: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/19.jpg)
Security Design
• Consider: Authentication, Authorisation, Access Control, Confidentiality, Integrity, Non-Repudiation, Availability, Accountability/Audit
• Access control is the largest outstanding problem for the Discovery Service (due to multi-ownership of data and
© 2008
Discovery Service (due to multi-ownership of data and granular access requirements)
• In Resource Directory model access control policies can be considered as a subset of the EPCIS policy
• Access control of reading/writing/deleting records (EPC, aggregation, resources) and policies
• Need to manage EPCIS/DS and other (partners!) policies together to avoid conflicts
![Page 20: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/20.jpg)
Client
STSPEP
STSOrganisation
Web Service
Polic ies
PDP
PDP
Organisation
W eb Service
Polic ies
Build on EU TRUSTCOM project
and Web Service security standards
Security Framework
Role for external security services?(identity, attribute/role,
authorization)
© 2008
Discovery Service
P
E
P
PDPSTSPublisher
P
E
P
DS Records Policies
Data Records-EPC records
-Aggregation records
-Resource records
Policies-Local Discovery Service Polic ies
-Publisher Data Policies
Organisation
Web Service
Polic ies
EPCIS
EPCIS
Records
Security
Policy
Manager
Need XACML 3.0+
![Page 21: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/21.jpg)
Main Access Control Enforcement
Options for RFID Service
Policies on
request header
Policies on
request body
Policies on
Information
Enforcement Points
Modification of query at ingress not
feasible due to potential large
number of applicable policies
© 2008
RFID Service OrganisationClient Organisation
client
Web
Service
Security
Gateway
Web
Service
Security
Gateway
RFID Service
Egress
interfacePresentation
Ingress
InterfaceInformation
Retrieval/Storage
![Page 22: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/22.jpg)
Policy Capabilities
• Publisher Control
• Mandated Community Policies
• Group Separation (of Publishing)
– Achieve groups through policies rather than
© 2008
– Achieve groups through policies rather than separation of data at publishing
• Emergency Policies
– Assertion of supply chain events e.g. product recall
• Delegation
– Ability to delegate management without access?
– Delegation through assertions or policies?
![Page 23: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/23.jpg)
Policy Attributes
• Subject
– Identity, role, group, organisation, country?
• Context
© 2008
– Supply chain event, load, query time/date?
• Resource
– EPC, bizStep, disposition, record time/date?
![Page 24: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/24.jpg)
Further Security Questions
• Data retention
– Delete and/or void action (can have both and restrict DS instance using security policies)
– If preventing deletion, also need to prevent removal of access rights!
• Introduction of unknown parties
© 2008
• Introduction of unknown parties
– Permit/deny/introduce policy evaluation
• DS as Authorisation Authority (single sign-on)
• Semantic policy languages
– E.g. “customers who purchased an item”
• Automated policy distribution (EPCIS publisher extension?)
![Page 25: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/25.jpg)
BRIDGE contributions to standardization activities
Mark Harrison
© 2008
Mark Harrison
Auto-ID Lab, University of Cambridge
21st May 2008
![Page 26: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/26.jpg)
BRIDGE contributions toDS standardization activities
• Members of BRIDGE WP2,3,4 have been actively participating in activities towards standardization at EPCglobal and also within the IETF and have contributed public deliverables from WP2 to both activities.
• The EPCglobal Data Discovery JRG is gathering use cases and analyzing these to extract technical & security requirements.
© 2008
• The ESDS activity aims to develop a generic protocol for handling dynamic referrals, which can be used for Discovery Services in supply chains / product lifecycle, as well as for other purposes.
• We are trying to help ensure that there is good communication between these two activities, to minimize duplication of effort and divergence - and to try to ensure that work on an ESDS protocol within IETF considers requirements from EPCglobal and aims to provide something useful that can be further developed by an EPCglobal technical work group in the future.
![Page 27: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/27.jpg)
BRIDGE contributions toEPCglobal Data Discovery JRG
• In the EPCglobal Data Discovery JRG, members of BRIDGE WP2 compiled a detailed questionnaire that has been refined by the DD JRG group and is being used as the basis for analysis of use cases from end-users, in order to extract technical, performance and security requirements.
© 2008
security requirements.
• We join the bi-weekly DD JRG calls and try to ask relevant questions and provide clarifications where needed.
![Page 28: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/28.jpg)
BRIDGE contributions [email protected]
• In April 2007, while we were nearing the end of the BRIDGE high-level design task, Michael Young and Frank Thompson (Afilias) published three internet drafts concerning a draft protocol for Extensible Supply Chain Discovery Services (ESDS).
• Via face-to-face meetings and discussion on the ESDS mailing list ([email protected]), we have contributed feedback on their internet drafts, posted the BRIDGE requirements documents and high-level
© 2008
drafts, posted the BRIDGE requirements documents and high-level design documents to the mailing list and (together with Frank Thompson) begun a comparison between their draft protocol and the BRIDGE high-level design work.
• BRIDGE D2.2 appendix has a table comparing the two designs.
• Feedback from BRIDGE has already resulted in some revisions of the ESDS draft documents
• Mark Harrison (WP3 lead, WP2 member) co-chaired the first ESDS 'Birds of a Feather' kick-off meeting at the 71st IETF meeting, in Philadelphia, March 2008.
![Page 29: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/29.jpg)
Beyond Discovery Services:a framework for enhanced track & trace
Mark Harrison
© 2008
Mark Harrison
Auto-ID Lab, University of Cambridge
21st May 2008
![Page 30: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/30.jpg)
WP3 Serial-level supply chain control /Framework for enhanced track & trace
Main objective: Gather event data from across the supply chain / product
lifecycle, analyse it, and enhance business processes and decision-making ability
Develop ‘tracking model’ algorithms to be able to:
–estimate the location of products in the supply chain
© 2008
Leader:
Partners:
–analyse delays or deviations from expected routes
–predict when/where objects will be seen next
![Page 31: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/31.jpg)
It does not make sense to connect
WP
3 E
nh
an
ce
d T
rackin
g M
od
els
sp
ecific
exte
nsio
ns
Ta
g D
ata
Sta
nd
ard
s &
Tra
ns
lati
on
leve
l R
P
Ap
pli
ca
tio
n L
eve
l E
ve
nts
(A
LE
)
detect
&
identify
filter enhance
store
&
share
gather
what, where, when + why, which transactions
which business step(where next)
aggregation changes?
where to find the info
business questionsand alerting
analyzedecide
& act
ON
S 1
.0
ON
S
Ratified EPCglobal standards WP2 WP3
EPC Network architecture - with extensions by
© 2008
Air
In
terf
ac
e(U
HF
Cla
ss1G
en 2
/ IS
O 1
8000-6
C)
Ta
gs
It does not make sense to connectRFID readers directly to Business Applications
RFID readers (and sensors) may generate too much dataWe don't want to overload applications / network
Business applications need information - not raw event data
Re
ad
ers
Bu
sin
ess A
pp
lica
tio
ns
Eve
nt C
ap
ture
Ap
plic
atio
n
Eve
nt R
ep
osito
rie
s
Dis
co
ve
ry S
erv
ice
s
WP
3 E
nh
an
ce
d T
rackin
g M
od
els
& A
pp
lica
tio
n-s
pe
cific
exte
nsio
ns
Filt
eri
ng
Mid
dle
wa
re
Ta
g D
ata
Sta
nd
ard
s &
Tra
ns
lati
on
Re
ad
er
Pro
toc
ol
/ L
ow
-le
ve
l R
P
EP
CIS
Qu
ery
In
terf
ac
e
EP
CIS
Ca
ptu
re I
nte
rfa
ce
Ap
pli
ca
tio
n L
eve
l E
ve
nts
(A
LE
)
AP
I fo
r W
P3
tra
ckin
g m
od
els
DS
Qu
ery
In
terf
ace
DS
Pu
blis
he
r In
terf
ace
ON
S 1
.0
ON
S
![Page 32: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/32.jpg)
BRIDGE WP3 (Enhanced Track & Trace)
• Cambridge Auto-ID Lab led task 3.1– Serial-level Inventory Control model
• Gathering of event data from across supply chain (via Discovery Services and EPC Information Services)
• Supply chain network modeling (as hierarchy of nodes)
© 2008
• Use of probabilistic algorithms and first-order Markov models to'learn and predict' the movement of objects
• Technical details reported in public document D3.1 (see BRIDGE website http://www.bridge-project.eu )
• Currently involved in collaborative development (together with BT and SAP) of an extensible software prototype to support various pilot and trial activities in various industry sectors across the BRIDGE project
![Page 33: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/33.jpg)
Supply Chain Network Model
Storage Shipping Receiving Receiving
GLN:123456789GLN:567891234
Discovery
Services
© 2008
Dock
#3
Dock
#1
Dock
#2
AreaShipping
Area
Receiving
Area
Shelf
#3
Shelf
#1
Shelf
#2
Door
#1
Door
#2
Dock
#1
Dock
#2
Receiving
Area
EPCIS
![Page 34: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/34.jpg)
Overview of database design
NODESSpatial_Separations
distances
between nodes,x kmConnection_Observations
average transit times
Event Log
© 2008
Current State
between nodes,intrinsic speeds
x km∆t
average transit timesbetween nodes,
standard deviations
Paths
which paths
between nodes
are permitted?
Transitions
70%
30%branching ratios
from historical
data
Algorithms
![Page 35: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/35.jpg)
Non-probabilistic query methods
• Where was it last observed? (tracking)
• Where are all the places it was observed? (trace)
Additional complications: changes of aggregation happen!
© 2008
• Items packed into cases, cases loaded onto pallets,pallets form shipments / are loaded into containers
• Components being assembled into composite products
• Disaggregation - unloading, disassembly, break down of bulk products into smaller units (e.g. for retail)
![Page 36: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/36.jpg)
Following changes of aggregation
CASE
PALLET
AggAgg
AggEvt
Add
AggEvt
Del
Agg
© 2008
ITEM
EAggEvt
Obs
timeItem packed into caseNeed to track case ID
Case packed onto palletNeed to track pallet ID
Case removed from palletNeed to track case ID
Item removed from caseResume tracking item ID
AggEvt
Add
AggEvt
Del
![Page 37: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/37.jpg)
Probabilistic algorithms: Filling in the ‘gaps’
Probabilistic reasoning enables:
• Filtering: Where is it? Estimate current location given observations so far
1%
© 2008
Location
Observation
99%
• Prediction: Where will it be next? Estimate future location given observations so far
60%
40%
Most likely
![Page 38: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/38.jpg)
Probabilistic algorithms: Filling in the ‘gaps’
• Smoothing: Where has it been? Estimate past location given observations so far
99%
1%
© 2008
• Where did it go through? Estimate the most likely path that an item has followed given observations so far
Location
Observation
Most likely
![Page 39: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/39.jpg)
Probabilistic algorithms: Models and Algorithms
X t X t+1 X t+2
Variable(Location)
© 2008
y t y t+1 y t+2
Evidence(Observation)
Transition model
Sensor model
![Page 40: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/40.jpg)
WP3 software prototype for enhanced serial-level track & trace
High-level Application Programming Interface (API)GraphicalUser Interface
BusinessApplications
Humanbeings
© 2008
BRIDGEWP3 Prototype
EPC Network Discovery Services EPC Information Services
Event Gathering Layer
Non-probabilistictrack & trace algorithms
Probabilistictrack & trace algorithms
internaldatabase
![Page 41: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/41.jpg)
Application Programming Interface
Goal: Interface to WP3’s Tracking Infrastructure
– support wide range of business applications
– expose tracking model through API and convenience functions
– exception handling & alerting
– trigger event collection from distributed sources
© 2008
– choreograph sequence of tracking algorithmsTargeted Recall,
Diversion, Shrinkage,
Lost & Found,
Asset Tracking,
Condition Monitoring,
Reconciliation, ...
BRIDGE
WP3 Prototype
EPC Network Discovery Services EPC Information Services
Event Gathering Layer
Non-probabilistic
track & trace algorithms
Probabilistic
track & trace algorithms
High-level Application Programming Interface (API)GraphicalUser Interface
BusinessApplicationsHuman
beings
internaldatabase
![Page 42: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/42.jpg)
WP3 software will be able to answer the following:
• Where was the object observed?(including tracking of parent(s) or children as necessary)
• Where is it likely to be now?
• What is the probability that the object will arrive at location X by time T?
• After how much elapsed time is the probability of arriving at location X
© 2008
• After how much elapsed time is the probability of arriving at location Xgreater than threshold probability P?
• Which path is the object likely to have taken?
• Alert me if my shipment is likely to arrive late at its destination
• Alert me to where delays are happening in the supply chain
• Alert me to inconsistencies (e.g. duplicate IDs at distant locations, similar times)
• Alert me to deviations from permitted paths (including 'insertions')
![Page 43: Building Radio frequency IDentification solutions for the ...Building Radio frequency IDentification solutions for the Global Environment BRIDGE Webinar – Discovery Services: Design,](https://reader033.fdocuments.net/reader033/viewer/2022042908/5f398dc3ff9124750a31203c/html5/thumbnails/43.jpg)
Contact us
• BRIDGE Project Website: http://www.bridge-project.eu
Email : [email protected]
• Presenters
Henri Barthel, BRIDGE Project coordinator
© 2008
Henri Barthel, BRIDGE Project coordinator
Miguel Angel Guijarro, AT4 wireless, WP2 Leader:
Mark Harrison, Cambridge University, WP3 Leader:
Trevor Burbridge, BT, WP4 Leader