People’s Daily Online: How does the blockchain protect “safety on the tip of the tongue”?

Meat and vegetables are indispensable for the three meals a day. If the origin of these ingredients is not clear, you will not feel at ease eating them. The food safety traceability platform affixed an “identity card” to each kind of food, and traced the origin to ensure the safety of our “vegetable basket”.

What technologies are used for food safety traceability?

Generally, food safety traceability platforms mainly use distributed storage technology, hash algorithms, asymmetric encryption algorithms, and encryption anchoring technology.

1. Distributed storage technology

Traditional food traceability is the centralized storage of information, which is stored in a server. The distributed storage of the blockchain breaks up data information into multiple small pieces of data, which are stored in different servers. This means that every computer is a node, and the more nodes are distributed, the more decentralized the blockchain network and the more secure network information. The food safety traceability platform uses blockchain technology to distribute the information of food production, circulation, consumption and other information on each node. Even if one node does not work, it will not hinder the flow of information of other nodes, ensuring the safety and integrity of information.

2. Hash algorithm and asymmetric encryption algorithm

Hash algorithm is also called hash algorithm. A method is used to calculate a fixed-length hash value from the digest or string of the information, which is equivalent to an ID card. The hash value is unique and one-way. The established information corresponds to a unique hash value. After the information is modified, the hash value will change accordingly. In addition, the hash value cannot be reversed out of the stored information, ensuring that the information is difficult to tamper with. After the hash value is stored on the chain and stored in the block, the block and the block are connected to form a block chain. The current block includes the hash value of the previous block, and the latter block includes the hash value of the previous block. Ensure the traceability of food circulation information.

Asymmetric encryption uses two keys: public key and private key. The public key is used to encrypt or verify the signature, and the private key is used to decrypt or sign. The two correspond to each other. The data encrypted with the public key can only be decrypted with the corresponding private key, and the data signed with the private key can only be verified with the public key. The use of these two types of technologies can not only trace the origin of food, but also monitor the entire process of food circulation and transaction to ensure food safety.

3. Encrypted anchoring technology

Encryption anchoring technology is a tamper-proof digital fingerprint, these fingerprints have a variety of manifestations, such as optical codes. The encryption anchor can be embedded in the product and linked with the blockchain to ensure the authenticity of the product from the departure to the delivery to the consumer. The encrypted anchoring technology of the ultra-micro trusted chip forms an encrypted anchored smart label, which ensures that the label and traceability information cannot be copied, and realizes the temperature and humidity monitoring of the whole process of food circulation. In addition, this technology combines the difficult-to-tamper and traceability characteristics of the blockchain to realize all-round anti-counterfeiting traceability of food.

Advantages of blockchain traceability food safety

Traditional food safety traceability mainly uses centralized storage technology, and food information is stored in a server. In this environment, food upstream and downstream participants sometimes tamper with food information for personal benefit. With the blessing of blockchain technology, the production, circulation, and sales of food have been monitored throughout the entire process, realizing the authenticity, transparency, traceability, and difficulty of tampering with food information. Therefore, the blockchain food traceability technology dispels users’ worries about food safety and solves the problem of trust among participants in all aspects of food production and circulation.

At present, Beijing has applied the cold chain food traceability platform to accumulatively record more than 400,000 tons of imported cold chain food, ensuring that the source of cold chain food supply, logistics information and consumption information can be traced, so that more citizens can eat and eat at ease .

Posted by:CoinYuppie,Reprinted with attribution to:https://coinyuppie.com/peoples-daily-online-how-does-the-blockchain-protect-safety-on-the-tip-of-the-tongue/
Coinyuppie is an open information publishing platform, all information provided is not related to the views and positions of coinyuppie, and does not constitute any investment and financial advice. Users are expected to carefully screen and prevent risks.

Leave a Reply