TECHNOLOGY

Dual-Layer Information Technology with Advanced Verification Process

About our hybrid database system

We propose an application in the food supply chain from seed to table, based on our new transparent network ecosystem for a variety of businesses in the food industry. Our hybrid database stores unaltered data using both centralized and decentralized databases with hash reference pointers connecting the two systems with great efficiency and security.

About our verification process for transparency

Can we trust unverified information with unknown sources? Third-party verification of critical information is the key to our new technology. At the time of delivery or drop-off, data will be inserted in real time to the network via our mobile app. There are two types of data: (i) manual data input and (ii) automatic data capture. Manual data input typically includes an invoice document scan and item photo taking via our mobile app. All other critical information will be automatically captured and uploaded to the network for verification, all at the same time when manual data input takes place. Automatic data capture includes the actual location data, time stamp, related user digital signatures, items, providers, etc. More importantly, all the previous transactions (if there is any) are linked to the most recent one so that people can enjoy truthful time series data.

About our information technology

The conventional centralized mechanism can be decentralized using the distributed ledger technology. Our technology is a combination of central and decentralized network systems – both network systems are up and running simultaneously. On top of the conventional system we keep the key aspects of the distributed ledger technology, including decentralization, immutability and cryptography-based authentication.

  • Decentralization

    Decentralized network of online registries that are synchronized to track transactions. Our secure network enables participants to verify information themselves.

  • Transparency and trust

    Essential part of our network is decentralized, which allows the system to be transparent. This is because the distributed ledger is shared by everyone who can see what happens on the network.

  • Immutability

    Complete documentation of the creation, modification and deletion of records. Verifiable transactions and improved transparency (e.g., access to critical food data).

  • Cryptographic security

    Transaction validation is based on digital signatures to verify identities, which is known only to the person who controls the account.

Automated Invoice Scan By Customized OCR

Currently, large food providers have developed and deployed their own tracking system to manage the whole supply chain, including digital signature and tracking mechanisms using specialized mobile hardware devices. However, paper-based invoices are still widely used for the following reasons: 

i.    It is challenging to establish reliable, trusted transactions between the different providers, vendors, and customers due to the lack of a standard protocol shared among software systems in use. 

ii.    Even if such protocol was introduced, companies are either reluctant to employ the standard into their system (unless enforced by law) or the reliability is limited as the integrity of the transaction within a company is solely dependent on the company's credibility if no third-party verification was involved.

To solve this problem, we have developed an automated invoice digitization system that converts paper-based transaction data into a digital one. This automated processing system can read information on paper and store it in the database. A variety of scanned invoices can be processed using our state-of-the-art machine learning and optical character recognition technologies.