当前位置:网站首页>Humi analysis: the integrated application of industrial Internet identity analysis and enterprise information system
Humi analysis: the integrated application of industrial Internet identity analysis and enterprise information system
2022-07-05 17:29:00 【yansunxer】
Industrial Internet as a new industrial ecosystem 、 Key infrastructure and new application models , Through man 、 machine 、 The overall interconnection of things , Achieve total elements 、 Whole industry chain 、 Full connection of the whole value chain , We will accelerate the transformation and upgrading of traditional industries 、 It has strongly supported the digital transformation of the real economy 、 Accelerated the process of China's fourth industrial revolution .
Identity resolution system is one of the important infrastructure of industrial Internet , It is to realize the industrial Internet across countries 、 regional 、 industry 、 The key basic system of enterprise interconnection . There are a variety of industrial Internet identity resolution technologies in the world , Mainstream technologies include code (Handle)、 Object identifier (OID)、 Unified identification of Internet of things (Ecode) code 、 International article code (GS1) etc. . Due to the relatively late start of industrial Internet identity resolution technology in China , Lack of mature construction experience , The relevant standard system is still improving , There is an urgent need for specific application scenarios of industrial Internet 、 Complex process flow and other specific application design , Construction is safe and efficient 、 Highly available identification resolution system .
6 month 21 Japan , Regional finals of the first China Industrial Internet logo innovation and application competition ( Western Division ) Successfully held in Chongqing . At the scene of the final , Suddenly, the analysis is finished “ Identify data interaction middleware and resource pool ”、“ Chain ” Take the initiative to mark the project work display and on-site defense , The characteristics of the project are elaborated within the specified time 、 Technical advantages, business scenarios and other information .
This project will build identification data interaction middleware and resource pool Services , Provide multi-source data collection 、 Heterogeneous data cleaning and transformation 、 Master data standardization 、 Cross platform information interaction and other service capabilities , Realize the integration and sharing of data resources under different network protocol hardware and operating systems , Realize the storage of identification data 、 Access and query 、 Identification data processing 、 Standardization of heterogeneous data , Promote the integration and application of industrial Internet identity analysis and industrial enterprise information system , Greatly improve the management and application capabilities of identification data . Achieve total elements 、 Whole industry chain 、 Full connection of the whole value chain , Promote the formation of a new manufacturing and service system , Optimize the allocation efficiency of resource elements , Give full play to manufacturing equipment 、 The potential of technology and materials , Improve the production efficiency of enterprises , Create differentiated products and provide value-added services .
Active identity can actively initiate a connection to the identity resolution platform , Be able to actively read data , To solve the problem that passive identification needs reading equipment and is easy to be read and tampered . Rapid docking identification analysis system , Reduce R & D investment . Reduce the difficulty of industrial internet terminal access identification system , Realize low-cost equipment access . It can enrich the application scenarios of identification , Eliminate basic business and identification data barriers , Realize the deep integration of logo and business . With the help of the safety features of active identification , Build a complete and trusted data chain from device to identity management service from bottom to top . Ensure the safety of industrial data collection , Realize identity authentication based on identity 、 Data encryption 、 Access control and other purposes .
边栏推荐
- Force deduction solution summary 729- my schedule I
- WR | 西湖大学鞠峰组揭示微塑料污染对人工湿地菌群与脱氮功能的影响
- Zhang Ping'an: accelerate cloud digital innovation and jointly build an industrial smart ecosystem
- Is it safe for qiniu business school to open a stock account? Is it reliable?
- BigDecimal除法的精度问题
- Winedt common shortcut key modify shortcut key latex compile button
- Example tutorial of SQL deduplication
- 云安全日报220705:红帽PHP解释器发现执行任意代码漏洞,需要尽快升级
- 漫画:有趣的【海盗】问题
- Embedded -arm (bare board development) -2
猜你喜欢
33:第三章:开发通行证服务:16:使用Redis缓存用户信息;(以减轻数据库的压力)
CMake教程Step1(基本起点)
stirring! 2022 open atom global open source summit registration is hot!
Judge whether a string is a full letter sentence
Learn about MySQL transaction isolation level
c#图文混合,以二进制方式写入数据库
Summary of optimization scheme for implementing delay queue based on redis
IDEA 项目启动报错 Shorten the command line via JAR manifest or via a classpath file and rerun.
WR | 西湖大学鞠峰组揭示微塑料污染对人工湿地菌群与脱氮功能的影响
Use of ThinkPHP template
随机推荐
Tita performance treasure: how to prepare for the mid year examination?
Use JDBC technology and MySQL database management system to realize the function of course management, including adding, modifying, querying and deleting course information.
ThoughtWorks global CTO: build the architecture according to needs, and excessive engineering will only "waste people and money"
Domain name resolution, reverse domain name resolution nbtstat
Alpha conversion from gamma space to linner space under URP (II) -- multi alpha map superposition
关于mysql中的json解析函数JSON_EXTRACT
叩富网开期货账户安全可靠吗?怎么分辨平台是否安全?
ClickHouse(03)ClickHouse怎么安装和部署
激动人心!2022开放原子全球开源峰会报名火热开启!
世界上最难的5种编程语言
What else do you not know about new map()
33:第三章:开发通行证服务:16:使用Redis缓存用户信息;(以减轻数据库的压力)
独立开发,不失为程序员的一条出路
华为云云原生容器综合竞争力,中国第一!
北京内推 | 微软亚洲研究院机器学习组招聘NLP/语音合成等方向全职研究员
Cartoon: a bloody case caused by a math problem
Debug kernel code through proc interface
Cartoon: interesting pirate problem (full version)
机器学习01:绪论
Embedded-c Language-2