to address the “what, where, and why” questions to suce consumer and regulatory necessities
for precise and detailed product details.
The main aim of EPCIS is to provide disparate applications to build and provide event data,
both across and within enterprises. This naturally helps the users to obtain a shared view of
digital or physical objects under a relevant business context.
EPCIS are meant to be utilized in combination with the GS1 Core Business Vocabulary
(CBV). The CBV gives descriptions of data values that may be utilized to gather the data together
defined in the standards of EPCIS.
uCode
uCode represents a unique identification number given to individual objects. uCodes are use-
ful to get digital information about objects and places. The uCode is a 128-bit fixed length
identification system. It is a mechanism that works to extend the Unicode length in units of
128 bits that has been made to fulfill the future demands so codes that are longer than 128
bits can also get defined. When uCode gets assigned to an object or a place in our real world,
the uCode is saved in a tag (this tag is known as uCode tag) like an RFID tag, bar code, or a
two-dimensional bar code.
uCode simply works as an identification number. There is no bond between the unique
number and the quality and meaning of the goal in databases. The unique quality and the
meaning can be gathered from the databases by utilizing the uCode as a key. Since uCode
is a unique identification number, it is very important to ensure that the uniqueness of
provided uCodes is well maintained. Multiple goals with the same assigned uCodes will
never work.
When the goal of an already issued code disappears, the uCode also gets cancelled. Thus,
the same code that was used before won’t be used ever again. Thus, the uniqueness of a uCode
is well ensured both over time and space.
URIs
The acronym “URI” stands for Uniform Resource Identifier. It works as a string of characters that
are utilized to identify resources or names on the internet. The URI is designed to describe the
mechanism used for accessing resources. URI identification makes it possible to interact with
the resource representation with networks utilizing specific protocols.
There are two types of URIs:
1. URL (Uniform Resource Locator): This kind of URI starts by mentioning which protocol
should be utilized to trace and use the logical or physical resource on a network. For
example: If the resource page is a web page, then the URI will start with the commonly
used protocol HTTP. However, if the resource is a file, then the URI will start with the
other protocol FTP. In other cases, if the resource is an email address, then the URI will
start with another protocol called mailto. It is a very crucial thing to know that URLs
are not persistent. Thus, in case the resource changes its location, then the URL will also
need to change towards resource’s new location.
2. URN (Uniform Resource Name): This kind of URI does not mention which protocol
should be utilized to trace and use the resource. Instead, it labels a resource with a
location-independent, persistent unique identifier. An URN helps us to identify the
resource for its whole lifecycle and won’t change ever.
Chapter 5 IoT Core Modules 111
Internet_of_Things_CH05_pp105-140.indd 111 9/3/2019 10:13:54 AM